Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Haining Wang
@article{DBLP:journals/eswa/YangLWSL24, author = {Kai Yang and Qiang Li and Haining Wang and Limin Sun and Jiqiang Liu}, title = {Fingerprinting Industrial IoT devices based on multi-branch neural network}, journal = {Expert Syst. Appl.}, volume = {238}, number = {Part {F}}, pages = {122371}, year = {2024}, url = {https://doi.org/10.1016/j.eswa.2023.122371}, doi = {10.1016/J.ESWA.2023.122371}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eswa/YangLWSL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ZhangWS24, author = {Yubao Zhang and Haining Wang and Angelos Stavrou}, title = {A multiview clustering framework for detecting deceptive reviews}, journal = {J. Comput. Secur.}, volume = {32}, number = {1}, pages = {31--52}, year = {2024}, url = {https://doi.org/10.3233/JCS-220001}, doi = {10.3233/JCS-220001}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcs/ZhangWS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isscc/TangLCWYMT24, author = {Zhong Tang and Yuyan Liu and Pengpeng Chen and Haining Wang and Xiaopeng Yu and Kofi A. A. Makinwa and Nianxiong Nick Tan}, title = {3.4 {A} 14b 98Hz-to-5.9kHz 1.7-to-50.8 {\(\mu\)} {W} BW/Power Scalable Sensor Interface with a Dynamic Bandgap Reference and an Untrimmed Gain Error of {\(\pm\)} 0.26 {\%} from -40{\textdegree}C to 125{\textdegree}C}, booktitle = {{IEEE} International Solid-State Circuits Conference, {ISSCC} 2024, San Francisco, CA, USA, February 18-22, 2024}, pages = {60--62}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ISSCC49657.2024.10454378}, doi = {10.1109/ISSCC49657.2024.10454378}, timestamp = {Tue, 19 Mar 2024 09:04:31 +0100}, biburl = {https://dblp.org/rec/conf/isscc/TangLCWYMT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-03642, author = {Haining Wang}, title = {A Content-Based Novelty Measure for Scholarly Publications: {A} Proof of Concept}, journal = {CoRR}, volume = {abs/2401.03642}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.03642}, doi = {10.48550/ARXIV.2401.03642}, eprinttype = {arXiv}, eprint = {2401.03642}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-03642.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/apin/LiuKLWY23, author = {Jiansong Liu and Yan Kang and Hao Li and Haining Wang and Xuekun Yang}, title = {{STGHTN:} Spatial-temporal gated hybrid transformer network for traffic flow forecasting}, journal = {Appl. Intell.}, volume = {53}, number = {10}, pages = {12472--12488}, year = {2023}, url = {https://doi.org/10.1007/s10489-022-04122-x}, doi = {10.1007/S10489-022-04122-X}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/apin/LiuKLWY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cmpb/GuZZZWLLH23, author = {Xianfan Gu and Yu Zhang and Wen Zeng and Sihua Zhong and Haining Wang and Dong Liang and Zhenlin Li and Zhanli Hu}, title = {Cross-modality image translation: {CT} image synthesis of {MR} brain images using multi generative network with perceptual supervision}, journal = {Comput. Methods Programs Biomed.}, volume = {237}, pages = {107571}, year = {2023}, url = {https://doi.org/10.1016/j.cmpb.2023.107571}, doi = {10.1016/J.CMPB.2023.107571}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cmpb/GuZZZWLLH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/KangXWWWL23, author = {Yan Kang and Wentao Xie and Xiaopeng Wang and Haining Wang and Xinchao Wang and Jinyuan Li}, title = {{MOPISDE:} {A} collaborative multi-objective information-sharing {DE} algorithm for software clustering}, journal = {Expert Syst. Appl.}, volume = {226}, pages = {120207}, year = {2023}, url = {https://doi.org/10.1016/j.eswa.2023.120207}, doi = {10.1016/J.ESWA.2023.120207}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eswa/KangXWWWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/finr/NiLWLLL23, author = {Shuyan Ni and Cunbao Lin and Haining Wang and Yang Li and Yurong Liao and Na Li}, title = {Learning geometric Jensen-Shannon divergence for tiny object detection in remote sensing images}, journal = {Frontiers Neurorobotics}, volume = {17}, year = {2023}, url = {https://doi.org/10.3389/fnbot.2023.1273251}, doi = {10.3389/FNBOT.2023.1273251}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/finr/NiLWLLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/WanLWLS23, author = {Shangfeng Wan and Qiang Li and Haining Wang and Hong Li and Limin Sun}, title = {DevTag: {A} Benchmark for Fingerprinting IoT Devices}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {7}, pages = {6388--6399}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2022.3225580}, doi = {10.1109/JIOT.2022.3225580}, timestamp = {Mon, 30 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/WanLWLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/FamiliSWP23, author = {Alireza Famili and Angelos Stavrou and Haining Wang and Jung{-}Min Park}, title = {iDROP: Robust Localization for Indoor Navigation of Drones With Optimized Beacon Placement}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {16}, pages = {14226--14238}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2023.3280084}, doi = {10.1109/JIOT.2023.3280084}, timestamp = {Mon, 30 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/FamiliSWP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/FamiliASWP23, author = {Alireza Famili and Tolga O. Atalay and Angelos Stavrou and Haining Wang and Jung{-}Min Park}, title = {{OFDRA:} Optimal Femtocell Deployment for Accurate Indoor Positioning of RIS-Mounted AVs}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {41}, number = {12}, pages = {3783--3798}, year = {2023}, url = {https://doi.org/10.1109/JSAC.2023.3322821}, doi = {10.1109/JSAC.2023.3322821}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsac/FamiliASWP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/KangWPLLYT23, author = {Yan Kang and Haining Wang and Bin Pu and Jiansong Liu and Shin{-}Jye Lee and Xuekun Yang and Liu Tao}, title = {{TMHSCA:} a novel hybrid two-stage mutation with a sine cosine algorithm for discounted \{0-1\} knapsack problems}, journal = {Neural Comput. Appl.}, volume = {35}, number = {17}, pages = {12691--12713}, year = {2023}, url = {https://doi.org/10.1007/s00521-023-08367-6}, doi = {10.1007/S00521-023-08367-6}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nca/KangWPLLYT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/KangWPLLYT23a, author = {Yan Kang and Haining Wang and Bin Pu and Jiansong Liu and Shin{-}Jye Lee and Xuekun Yang and Liu Tao}, title = {Correction to: {TMHSCA:} a novel hybrid two-stage mutation with a sine cosine algorithm for discounted \{0-1\} knapsack problems}, journal = {Neural Comput. Appl.}, volume = {35}, number = {17}, pages = {12715}, year = {2023}, url = {https://doi.org/10.1007/s00521-023-08595-w}, doi = {10.1007/S00521-023-08595-W}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nca/KangWPLLYT23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcbb/KangWPTCY23, author = {Yan Kang and Haining Wang and Bin Pu and Liu Tao and Jianguo Chen and Philip S. Yu}, title = {A Hybrid Two-Stage Teaching-Learning-Based Optimization Algorithm for Feature Selection in Bioinformatics}, journal = {{IEEE} {ACM} Trans. Comput. Biol. Bioinform.}, volume = {20}, number = {3}, pages = {1746--1760}, year = {2023}, url = {https://doi.org/10.1109/TCBB.2022.3215129}, doi = {10.1109/TCBB.2022.3215129}, timestamp = {Thu, 07 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcbb/KangWPTCY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tim/WangLLFNLJ23, author = {Haining Wang and Yurong Liao and Yang Li and Yuqiang Fang and Shuyan Ni and Yalun Luo and Bitao Jiang}, title = {BDR-Net: Bhattacharyya Distance-Based Distribution Metric Modeling for Rotating Object Detection in Remote Sensing}, journal = {{IEEE} Trans. Instrum. Meas.}, volume = {72}, pages = {1--12}, year = {2023}, url = {https://doi.org/10.1109/TIM.2022.3221101}, doi = {10.1109/TIM.2022.3221101}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tim/WangLLFNLJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/titb/FuWWZYWZSWZLH23, author = {Minghan Fu and Meiyun Wang and Yaping Wu and Na Zhang and Yongfeng Yang and Haining Wang and Yun Zhou and Yue Shang and Fang{-}Xiang Wu and Hairong Zheng and Dong Liang and Zhanli Hu}, title = {A Two-Branch Neural Network for Short-Axis {PET} Image Quality Enhancement}, journal = {{IEEE} J. Biomed. Health Informatics}, volume = {27}, number = {6}, pages = {2864--2875}, year = {2023}, url = {https://doi.org/10.1109/JBHI.2023.3260180}, doi = {10.1109/JBHI.2023.3260180}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/titb/FuWWZYWZSWZLH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/FamiliSWP23, author = {Alireza Famili and Angelos Stavrou and Haining Wang and Jung{-}Min Park}, title = {{PILOT:} High-Precision Indoor Localization for Autonomous Drones}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {72}, number = {5}, pages = {6445--6459}, year = {2023}, url = {https://doi.org/10.1109/TVT.2022.3229628}, doi = {10.1109/TVT.2022.3229628}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/FamiliSWP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/ChangQW23, author = {Le Chang and Tao Qin and Haining Wang}, editor = {Aaron Marcus and Elizabeth Rosenzweig and Marcelo M. Soares}, title = {Vibration Strength Comfort of Smartwatch in Notification Scene}, booktitle = {Design, User Experience, and Usability - 12th International Conference, {DUXU} 2023, Held as Part of the 25th {HCI} International Conference, {HCII} 2023, Copenhagen, Denmark, July 23-28, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14032}, pages = {128--140}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35702-2\_9}, doi = {10.1007/978-3-031-35702-2\_9}, timestamp = {Thu, 13 Jul 2023 13:25:11 +0200}, biburl = {https://dblp.org/rec/conf/hci/ChangQW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/LiuYW23, author = {Yuxuan Liu and Qijuan Yu and Haining Wang}, editor = {Jessie Y. C. Chen and Gino Fragomeni and Xiaowen Fang}, title = {Grip Comfort Study of Virtual Reality Handles}, booktitle = {{HCI} International 2023 - Late Breaking Papers - 25th International Conference on Human-Computer Interaction, {HCII} 2023, Copenhagen, Denmark, July 23-28, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14058}, pages = {135--146}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-48050-8\_10}, doi = {10.1007/978-3-031-48050-8\_10}, timestamp = {Sat, 09 Dec 2023 09:49:51 +0100}, biburl = {https://dblp.org/rec/conf/hci/LiuYW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/QinCW23, author = {Tao Qin and Le Chang and Haining Wang}, editor = {Aaron Marcus and Elizabeth Rosenzweig and Marcelo M. Soares}, title = {Perception of the Vibration Intensity of Smartwatches in the Notification Scene}, booktitle = {Design, User Experience, and Usability - 12th International Conference, {DUXU} 2023, Held as Part of the 25th {HCI} International Conference, {HCII} 2023, Copenhagen, Denmark, July 23-28, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14032}, pages = {270--283}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35702-2\_20}, doi = {10.1007/978-3-031-35702-2\_20}, timestamp = {Thu, 13 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hci/QinCW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/YanLJW23, author = {Yan Yan and Kexiang Liu and Rui Jiang and Haining Wang}, editor = {Aaron Marcus and Elizabeth Rosenzweig and Marcelo M. Soares}, title = {The Effects of Primary Output Design of True Wireless Earbuds on the Wearing Comfort}, booktitle = {Design, User Experience, and Usability - 12th International Conference, {DUXU} 2023, Held as Part of the 25th {HCI} International Conference, {HCII} 2023, Copenhagen, Denmark, July 23-28, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14032}, pages = {421--435}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35702-2\_30}, doi = {10.1007/978-3-031-35702-2\_30}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hci/YanLJW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/ZengDW23, author = {Ke Zeng and Qiannan Deng and Haining Wang}, editor = {Aaron Marcus and Elizabeth Rosenzweig and Marcelo M. Soares}, title = {Effects of Image Size and Position on Text Legibility of Foldable Smartphones}, booktitle = {Design, User Experience, and Usability - 12th International Conference, {DUXU} 2023, Held as Part of the 25th {HCI} International Conference, {HCII} 2023, Copenhagen, Denmark, July 23-28, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14032}, pages = {436--446}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35702-2\_31}, doi = {10.1007/978-3-031-35702-2\_31}, timestamp = {Thu, 13 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hci/ZengDW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/AlamGCWX23, author = {Shariful Alam and Le Guan and Zeyu Chen and Haining Wang and Jidong Xiao}, title = {{CAUSEC:} Cache-Based Secure Key Computation with (Mostly) Deprivileged Execution}, booktitle = {43rd {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2023, Hong Kong, July 18-21, 2023}, pages = {84--95}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICDCS57875.2023.00059}, doi = {10.1109/ICDCS57875.2023.00059}, timestamp = {Tue, 24 Oct 2023 14:47:33 +0200}, biburl = {https://dblp.org/rec/conf/icdcs/AlamGCWX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/LiuJ0ZLSW23, author = {Guannan Liu and Lin Jin and Shuai Hao and Yubao Zhang and Daiping Liu and Angelos Stavrou and Haining Wang}, editor = {Marie{-}Jos{\'{e}} Montpetit and Aris Leivadeas and Steve Uhlig and Mobin Javed}, title = {Dial "N" for NXDomain: The Scale, Origin, and Security Implications of {DNS} Queries to Non-Existent Domains}, booktitle = {Proceedings of the 2023 {ACM} on Internet Measurement Conference, {IMC} 2023, Montreal, QC, Canada, October 24-26, 2023}, pages = {198--212}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3618257.3624805}, doi = {10.1145/3618257.3624805}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/LiuJ0ZLSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/AtalayMSSW23, author = {Tolga O. Atalay and Sudip Maitra and Dragoslav Stojadinovic and Angelos Stavrou and Haining Wang}, title = {Securing 5G OpenRAN with a Scalable Authorization Framework for xApps}, booktitle = {{IEEE} {INFOCOM} 2023 - {IEEE} Conference on Computer Communications, New York City, NY, USA, May 17-20, 2023}, pages = {1--10}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/INFOCOM53939.2023.10228961}, doi = {10.1109/INFOCOM53939.2023.10228961}, timestamp = {Tue, 05 Sep 2023 20:33:21 +0200}, biburl = {https://dblp.org/rec/conf/infocom/AtalayMSSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/metacom/FamiliASW23, author = {Alireza Famili and Tolga O. Atalay and Angelos Stavrou and Haining Wang}, title = {Wi-Six: Precise Positioning in the Metaverse via Optimal Wi-Fi Router Deployment in 6G Networks}, booktitle = {{IEEE} International Conference on Metaverse Computing, Networking and Applications, MetaCom 2023, Kyoto, Japan, June 26-28, 2023}, pages = {17--24}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/MetaCom57706.2023.00019}, doi = {10.1109/METACOM57706.2023.00019}, timestamp = {Thu, 21 Mar 2024 17:12:49 +0100}, biburl = {https://dblp.org/rec/conf/metacom/FamiliASW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ChenLXW23, author = {Zeyu Chen and Daiping Liu and Jidong Xiao and Haining Wang}, title = {All Use-After-Free Vulnerabilities Are Not Created Equal: An Empirical Study on Their Characteristics and Detectability}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {623--638}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607229}, doi = {10.1145/3607199.3607229}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ChenLXW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/WangWSJWL23, author = {Shu Wang and Xinda Wang and Kun Sun and Sushil Jajodia and Haining Wang and Qi Li}, title = {GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {2409--2426}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179479}, doi = {10.1109/SP46215.2023.10179479}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/WangWSJWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/svcc/FamiliSWP23, author = {Alireza Famili and Angelos Stavrou and Haining Wang and Jung{-}Min Jerry Park}, title = {{EGO-6:} Enhancing Geofencing Security Systems with Optimal Deployment of 6G TRPs}, booktitle = {Silicon Valley Cybersecurity Conference, {SVCC} 2023, San Jose, CA, USA, May 17-19, 2023}, pages = {1--8}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SVCC56964.2023.10165032}, doi = {10.1109/SVCC56964.2023.10165032}, timestamp = {Mon, 10 Jul 2023 15:09:49 +0200}, biburl = {https://dblp.org/rec/conf/svcc/FamiliSWP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/FamiliASW23, author = {Alireza Famili and Tolga O. Atalay and Angelos Stavrou and Haining Wang}, title = {Wi-Five: Optimal Placement of Wi-Fi Routers in 5G Networks for Indoor Drone Navigation}, booktitle = {97th {IEEE} Vehicular Technology Conference, {VTC} Spring 2023, Florence, Italy, June 20-23, 2023}, pages = {1--7}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/VTC2023-Spring57618.2023.10201144}, doi = {10.1109/VTC2023-SPRING57618.2023.10201144}, timestamp = {Fri, 25 Aug 2023 08:20:01 +0200}, biburl = {https://dblp.org/rec/conf/vtc/FamiliASW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-00436, author = {Haining Wang}, title = {Enhancing Representation Generalization in Authorship Identification}, journal = {CoRR}, volume = {abs/2310.00436}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.00436}, doi = {10.48550/ARXIV.2310.00436}, eprinttype = {arXiv}, eprint = {2310.00436}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-00436.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-01440, author = {Xin Xie and Jiangqiong Li and Haining Wang}, title = {The Many Voices of Duying: Revisiting the Disputed Essays Between Lu Xun and Zhou Zuoren}, journal = {CoRR}, volume = {abs/2310.01440}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.01440}, doi = {10.48550/ARXIV.2310.01440}, eprinttype = {arXiv}, eprint = {2310.01440}, timestamp = {Thu, 19 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-01440.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-01568, author = {Haining Wang}, title = {Defending Against Authorship Identification Attacks}, journal = {CoRR}, volume = {abs/2310.01568}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.01568}, doi = {10.48550/ARXIV.2310.01568}, eprinttype = {arXiv}, eprint = {2310.01568}, timestamp = {Thu, 19 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-01568.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-17392, author = {Xuan Feng and Shuo Chen and Haining Wang}, title = {An Internet-wide Penetration Study on {NAT} Boxes via {TCP/IP} Side Channel}, journal = {CoRR}, volume = {abs/2311.17392}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.17392}, doi = {10.48550/ARXIV.2311.17392}, eprinttype = {arXiv}, eprint = {2311.17392}, timestamp = {Tue, 05 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-17392.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-04833, author = {Tolga O. Atalay and Dragoslav Stojadinovic and Alireza Famili and Angelos Stavrou and Haining Wang}, title = {A First Look at 5G Core Deployments on Public Cloud: Performance Evaluation of Control and User Planes}, journal = {CoRR}, volume = {abs/2312.04833}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.04833}, doi = {10.48550/ARXIV.2312.04833}, eprinttype = {arXiv}, eprint = {2312.04833}, timestamp = {Wed, 03 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-04833.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cbm/HuangTCWSZWFLHH22, author = {Zhengyong Huang and Si Tang and Zixiang Chen and Guoshuai Wang and Hao Shen and Yun Zhou and Haining Wang and Wei Fan and Dong Liang and Yingying Hu and Zhanli Hu}, title = {TG-Net: Combining transformer and {GAN} for nasopharyngeal carcinoma tumor segmentation based on total-body uEXPLORER {PET/CT} scanner}, journal = {Comput. Biol. Medicine}, volume = {148}, pages = {105869}, year = {2022}, url = {https://doi.org/10.1016/j.compbiomed.2022.105869}, doi = {10.1016/J.COMPBIOMED.2022.105869}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cbm/HuangTCWSZWFLHH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cii/YangWWS22, author = {Kai Yang and Haining Wang and Hongsong Zhu and Limin Sun}, title = {An effective intrusion-resilient mechanism for programmable logic controllers against data tampering attacks}, journal = {Comput. Ind.}, volume = {138}, pages = {103613}, year = {2022}, url = {https://doi.org/10.1016/j.compind.2022.103613}, doi = {10.1016/J.COMPIND.2022.103613}, timestamp = {Mon, 04 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cii/YangWWS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cmpb/HuangZWCSWZZYWL22, author = {Zhengyong Huang and Sijuan Zou and Guoshuai Wang and Zixiang Chen and Hao Shen and Haiyan Wang and Na Zhang and Lu Zhang and Fan Yang and Haining Wang and Dong Liang and Tianye Niu and Xiaohua Zhu and Zhanli Hu}, title = {ISA-Net: Improved spatial attention network for {PET-CT} tumor segmentation}, journal = {Comput. Methods Programs Biomed.}, volume = {226}, pages = {107129}, year = {2022}, url = {https://doi.org/10.1016/j.cmpb.2022.107129}, doi = {10.1016/J.CMPB.2022.107129}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cmpb/HuangZWCSWZZYWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BianHWC22, author = {Rui Bian and Shuai Hao and Haining Wang and Chase Cotton}, title = {Shining a light on dark places: {A} comprehensive analysis of open proxy ecosystem}, journal = {Comput. Networks}, volume = {208}, pages = {108893}, year = {2022}, url = {https://doi.org/10.1016/j.comnet.2022.108893}, doi = {10.1016/J.COMNET.2022.108893}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/BianHWC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/connection/YuLSLW22, author = {Zaiyang Yu and Shuang Li and Linjun Sun and Liang Liu and Haining Wang}, title = {Multi-distribution noise quantisation: an extreme compression scheme for transformer according to parameter distribution}, journal = {Connect. Sci.}, volume = {34}, number = {1}, pages = {990--1004}, year = {2022}, url = {https://doi.org/10.1080/09540091.2021.2024510}, doi = {10.1080/09540091.2021.2024510}, timestamp = {Fri, 13 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/connection/YuLSLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/GaoXWS22, author = {Xing Gao and Jidong Xiao and Haining Wang and Angelos Stavrou}, title = {Understanding the Security Implication of Aborting Virtual Machine Live Migration}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {10}, number = {2}, pages = {1275--1286}, year = {2022}, url = {https://doi.org/10.1109/TCC.2020.2982900}, doi = {10.1109/TCC.2020.2982900}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/GaoXWS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GaoLXWLW22, author = {Xing Gao and Guannan Liu and Zhang Xu and Haining Wang and Li Li and Xiaorui Wang}, title = {Investigating Security Vulnerabilities in a Hot Data Center with Reduced Cooling Redundancy}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {1}, pages = {208--226}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2020.2977292}, doi = {10.1109/TDSC.2020.2977292}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/GaoLXWLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiCWSJ22, author = {Yue Li and Zeyu Chen and Haining Wang and Kun Sun and Sushil Jajodia}, title = {Understanding Account Recovery in the Wild and its Security Implications}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {1}, pages = {620--634}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2020.2975789}, doi = {10.1109/TDSC.2020.2975789}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LiCWSJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiTGWLL22, author = {Qiang Li and Dawei Tan and Xin Ge and Haining Wang and Zhi Li and Jiqiang Liu}, title = {Understanding Security Risks of Embedded Devices Through Fine-Grained Firmware Fingerprinting}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {6}, pages = {4099--4112}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3119970}, doi = {10.1109/TDSC.2021.3119970}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiTGWLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsg/WangCLXWLWC22, author = {Zili Wang and Yandong Chen and Xueping Li and Yuancan Xu and Wenhua Wu and Shuhan Liao and Haining Wang and Shixiang Cao}, title = {Adaptive Harmonic Impedance Reshaping Control Strategy Based on a Consensus Algorithm for Harmonic Sharing and Power Quality Improvement in Microgrids With Complex Feeder Networks}, journal = {{IEEE} Trans. Smart Grid}, volume = {13}, number = {1}, pages = {47--57}, year = {2022}, url = {https://doi.org/10.1109/TSG.2021.3112692}, doi = {10.1109/TSG.2021.3112692}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsg/WangCLXWLWC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsg/WangCLLXWWC22, author = {Zili Wang and Yandong Chen and Xueping Li and Shuhan Liao and Yuancan Xu and Wenhua Wu and Haining Wang and Shixiang Cao}, title = {Impedance-Based Adaptively Reshaping Method for Enhancing Nonlinear Load Sharing and Voltage Quality in Islanded Microgrids With Virtual Synchronous Generator}, journal = {{IEEE} Trans. Smart Grid}, volume = {13}, number = {4}, pages = {2568--2578}, year = {2022}, url = {https://doi.org/10.1109/TSG.2022.3159726}, doi = {10.1109/TSG.2022.3159726}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsg/WangCLLXWWC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/www/KangYPWWXW22, author = {Yan Kang and Xuekun Yang and Bin Pu and Xiaokang Wang and Haining Wang and Yulong Xu and Puming Wang}, title = {{HWOA:} an intelligent hybrid whale optimization algorithm for multi-objective task selection strategy in edge cloud computing system}, journal = {World Wide Web}, volume = {25}, number = {5}, pages = {2265--2295}, year = {2022}, url = {https://doi.org/10.1007/s11280-022-01082-7}, doi = {10.1007/S11280-022-01082-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/www/KangYPWWXW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccoms/LuoLLZW22, author = {Yalun Luo and Yurong Liao and Zhaoming Li and Ke Zhang and Haining Wang}, title = {Radar Target Tracking Based on Interactive Multi-model Cubature Kalman Filter}, booktitle = {7th International Conference on Computer and Communication Systems, {ICCCS} 2022, Wuhan, China, April 22-25, 2022}, pages = {452--457}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICCCS55155.2022.9845870}, doi = {10.1109/ICCCS55155.2022.9845870}, timestamp = {Mon, 06 Nov 2023 12:57:51 +0100}, biburl = {https://dblp.org/rec/conf/ccoms/LuoLLZW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuL000W22, author = {Guannan Liu and Daiping Liu and Shuai Hao and Xing Gao and Kun Sun and Haining Wang}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Ready Raider One: Exploring the Misuse of Cloud Gaming Services}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {1993--2007}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560647}, doi = {10.1145/3548606.3560647}, timestamp = {Sat, 17 Dec 2022 01:15:29 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiuL000W22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/HouserHCW22, author = {Rebekah Houser and Shuai Hao and Chase Cotton and Haining Wang}, title = {A Comprehensive, Longitudinal Study of Government {DNS} Deployment at Global Scale}, booktitle = {52nd Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2022, Baltimore, MD, USA, June 27-30, 2022}, pages = {193--204}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSN53405.2022.00030}, doi = {10.1109/DSN53405.2022.00030}, timestamp = {Fri, 29 Jul 2022 16:33:35 +0200}, biburl = {https://dblp.org/rec/conf/dsn/HouserHCW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/McDonoughGWW22, author = {Kenton McDonough and Xing Gao and Shuai Wang and Haining Wang}, title = {Torpedo: {A} Fuzzing Framework for Discovering Adversarial Container Workloads}, booktitle = {52nd Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2022, Baltimore, MD, USA, June 27-30, 2022}, pages = {402--414}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSN53405.2022.00048}, doi = {10.1109/DSN53405.2022.00048}, timestamp = {Tue, 29 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/McDonoughGWW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/AtalaySFSW22, author = {Tolga O. Atalay and Dragoslav Stojadinovic and Alireza Famili and Angelos Stavrou and Haining Wang}, title = {Network-Slice-as-a-Service Deployment Cost Assessment in an End-to-End 5G Testbed}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2022, Rio de Janeiro, Brazil, December 4-8, 2022}, pages = {2056--2061}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/GLOBECOM48099.2022.10001579}, doi = {10.1109/GLOBECOM48099.2022.10001579}, timestamp = {Tue, 17 Jan 2023 08:56:31 +0100}, biburl = {https://dblp.org/rec/conf/globecom/AtalaySFSW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/LiuWLC22, author = {Kexiang Liu and Haining Wang and Qianling Liu and Qi Chen}, editor = {Marcelo M. Soares and Elizabeth Rosenzweig and Aaron Marcus}, title = {A Web-Based Application for {TWS} Earphone Design and Fit Evaluation}, booktitle = {Design, User Experience, and Usability: Design Thinking and Practice in Contemporary and Emerging Technologies - 11th International Conference, {DUXU} 2022, Held as Part of the 24th {HCI} International Conference, {HCII} 2022, Virtual Event, June 26 - July 1, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13323}, pages = {157--167}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-05906-3\_12}, doi = {10.1007/978-3-031-05906-3\_12}, timestamp = {Tue, 21 Jun 2022 15:24:33 +0200}, biburl = {https://dblp.org/rec/conf/hci/LiuWLC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/ChenW22, author = {Wanyu Chen and Haining Wang}, editor = {Marcelo M. Soares and Elizabeth Rosenzweig and Aaron Marcus}, title = {Combining Virtual Reality and Eye Tracking to Recognize Users' Aesthetic Preference for Product Modeling}, booktitle = {Design, User Experience, and Usability: {UX} Research, Design, and Assessment - 11th International Conference, {DUXU} 2022, Held as Part of the 24th {HCI} International Conference, {HCII} 2022, Virtual Event, June 26 - July 1, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13321}, pages = {173--181}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-05897-4\_13}, doi = {10.1007/978-3-031-05897-4\_13}, timestamp = {Tue, 21 Jun 2022 15:24:32 +0200}, biburl = {https://dblp.org/rec/conf/hci/ChenW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/DuWQJ22, author = {Yujia Du and Haining Wang and Meng Qiu and Yuxin Ju}, editor = {Marcelo M. Soares and Elizabeth Rosenzweig and Aaron Marcus}, title = {Fit Improvement of Facial Interface for Steam Massage Glasses Based on Principal Component Analysis Panel}, booktitle = {Design, User Experience, and Usability: Design Thinking and Practice in Contemporary and Emerging Technologies - 11th International Conference, {DUXU} 2022, Held as Part of the 24th {HCI} International Conference, {HCII} 2022, Virtual Event, June 26 - July 1, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13323}, pages = {300--310}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-05906-3\_23}, doi = {10.1007/978-3-031-05906-3\_23}, timestamp = {Tue, 21 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hci/DuWQJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/YuNWL22, author = {Qijuan Yu and Xinmiao Nie and Haining Wang and Zilong Li}, editor = {Marcelo M. Soares and Elizabeth Rosenzweig and Aaron Marcus}, title = {Comparison of Usability and Immersion Between Touch-Based and Mouse-Based Interaction: {A} Study of Online Exhibitions}, booktitle = {Design, User Experience, and Usability: {UX} Research, Design, and Assessment - 11th International Conference, {DUXU} 2022, Held as Part of the 24th {HCI} International Conference, {HCII} 2022, Virtual Event, June 26 - July 1, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13321}, pages = {325--338}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-05897-4\_23}, doi = {10.1007/978-3-031-05897-4\_23}, timestamp = {Tue, 21 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hci/YuNWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/ChenWL22, author = {Qi Chen and Haining Wang and Kexiang Liu}, editor = {Marcelo M. Soares and Elizabeth Rosenzweig and Aaron Marcus}, title = {Anthropometric Hand Dimensions of Chinese Adults Using Three-Dimensional Scanning Technique}, booktitle = {Design, User Experience, and Usability: Design for Emotion, Well-being and Health, Learning, and Culture - 11th International Conference, {DUXU} 2022, Held as Part of the 24th {HCI} International Conference, {HCII} 2022, Virtual Event, June 26 - July 1, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13322}, pages = {377--387}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-05900-1\_26}, doi = {10.1007/978-3-031-05900-1\_26}, timestamp = {Tue, 21 Jun 2022 15:24:32 +0200}, biburl = {https://dblp.org/rec/conf/hci/ChenWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/JuWDQ22, author = {Yuxin Ju and Haining Wang and Yujia Du and Meng Qiu}, editor = {Marcelo M. Soares and Elizabeth Rosenzweig and Aaron Marcus}, title = {Pressure Sensitivity Mapping of the Head Region for Chinese Adults for {AR} Glasses Design}, booktitle = {Design, User Experience, and Usability: Design for Emotion, Well-being and Health, Learning, and Culture - 11th International Conference, {DUXU} 2022, Held as Part of the 24th {HCI} International Conference, {HCII} 2022, Virtual Event, June 26 - July 1, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13322}, pages = {415--429}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-05900-1\_29}, doi = {10.1007/978-3-031-05900-1\_29}, timestamp = {Tue, 21 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hci/JuWDQ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/QiuWDJ22, author = {Meng Qiu and Haining Wang and Yujia Du and Yuxin Ju}, editor = {Marcelo M. Soares and Elizabeth Rosenzweig and Aaron Marcus}, title = {Online Virtual Simulation Course Design for {VR} Glasses Fit Analysis}, booktitle = {Design, User Experience, and Usability: {UX} Research, Design, and Assessment - 11th International Conference, {DUXU} 2022, Held as Part of the 24th {HCI} International Conference, {HCII} 2022, Virtual Event, June 26 - July 1, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13321}, pages = {473--483}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-05897-4\_33}, doi = {10.1007/978-3-031-05897-4\_33}, timestamp = {Tue, 21 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hci/QiuWDJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/interspeech/TianDGWL22, author = {Zuoyu Tian and Xiao Dong and Feier Gao and Haining Wang and Chien{-}Jer Charles Lin}, editor = {Hanseok Ko and John H. L. Hansen}, title = {Mandarin Tone Sandhi Realization: Evidence from Large Speech Corpora}, booktitle = {Interspeech 2022, 23rd Annual Conference of the International Speech Communication Association, Incheon, Korea, 18-22 September 2022}, pages = {5273--5277}, publisher = {{ISCA}}, year = {2022}, url = {https://doi.org/10.21437/Interspeech.2022-10897}, doi = {10.21437/INTERSPEECH.2022-10897}, timestamp = {Wed, 21 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/interspeech/TianDGWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscit/PeiLOW22, author = {Feng Pei and Yongqi Liu and Shifeng Ou and Haining Wang}, title = {A Noise Type Classifier for Speech Enhancement in {DCT} Domain}, booktitle = {21st International Symposium on Communications and Information Technologies, {ISCIT} 2022, Xi'an, China, September 27-30, 2022}, pages = {312--316}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ISCIT55906.2022.9931292}, doi = {10.1109/ISCIT55906.2022.9931292}, timestamp = {Fri, 18 Nov 2022 20:51:15 +0100}, biburl = {https://dblp.org/rec/conf/iscit/PeiLOW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincom/FamiliFASW22, author = {Alireza Famili and Mahsa Foruhandeh and Tolga O. Atalay and Angelos Stavrou and Haining Wang}, editor = {Igor M. Moraes and Miguel Elias M. Campista and Yacine Ghamri{-}Doudane and Lu{\'{\i}}s Henrique M. K. Costa and Marcelo G. Rubinstein}, title = {{GPS} Spoofing Detection by Leveraging 5G Positioning Capabilities}, booktitle = {{IEEE} Latin-American Conference on Communications, {LATINCOM} 2022, Rio de Janeiro, Brazil, November 30 - Dec. 2, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/LATINCOM56090.2022.10000569}, doi = {10.1109/LATINCOM56090.2022.10000569}, timestamp = {Mon, 09 Jan 2023 17:07:16 +0100}, biburl = {https://dblp.org/rec/conf/latincom/FamiliFASW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincom/FamiliSWP22, author = {Alireza Famili and Angelos Stavrou and Haining Wang and Jung{-}Min Jerry Park}, editor = {Igor M. Moraes and Miguel Elias M. Campista and Yacine Ghamri{-}Doudane and Lu{\'{\i}}s Henrique M. K. Costa and Marcelo G. Rubinstein}, title = {{SPIN:} Sensor Placement for Indoor Navigation of Drones}, booktitle = {{IEEE} Latin-American Conference on Communications, {LATINCOM} 2022, Rio de Janeiro, Brazil, November 30 - Dec. 2, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/LATINCOM56090.2022.10000583}, doi = {10.1109/LATINCOM56090.2022.10000583}, timestamp = {Mon, 09 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/latincom/FamiliSWP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lrec/WangR22, author = {Haining Wang and Allen Riddell}, editor = {Nicoletta Calzolari and Fr{\'{e}}d{\'{e}}ric B{\'{e}}chet and Philippe Blache and Khalid Choukri and Christopher Cieri and Thierry Declerck and Sara Goggi and Hitoshi Isahara and Bente Maegaard and Joseph Mariani and H{\'{e}}l{\`{e}}ne Mazo and Jan Odijk and Stelios Piperidis}, title = {{CCTAA:} {A} Reproducible Corpus for Chinese Authorship Attribution Research}, booktitle = {Proceedings of the Thirteenth Language Resources and Evaluation Conference, {LREC} 2022, Marseille, France, 20-25 June 2022}, pages = {5889--5893}, publisher = {European Language Resources Association}, year = {2022}, url = {https://aclanthology.org/2022.lrec-1.633}, timestamp = {Mon, 10 Oct 2022 16:57:52 +0200}, biburl = {https://dblp.org/rec/conf/lrec/WangR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/HeWXFWLC022, author = {Xu He and Shu Wang and Yunlong Xing and Pengbin Feng and Haining Wang and Qi Li and Songqing Chen and Kun Sun}, title = {BinProv: Binary Code Provenance Identification without Disassembly}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {350--363}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545956}, doi = {10.1145/3545948.3545956}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/HeWXFWLC022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmetrics/Jin0WC22, author = {Lin Jin and Shuai Hao and Haining Wang and Chase Cotton}, editor = {D. Manjunath and Jayakrishnan Nair and Niklas Carlsson and Edith Cohen and Philippe Robert}, title = {Understanding the Practices of Global Censorship through Accurate, End-to-End Measurements}, booktitle = {{SIGMETRICS/PERFORMANCE} '22: {ACM} {SIGMETRICS/IFIP} {PERFORMANCE} Joint International Conference on Measurement and Modeling of Computer Systems, Mumbai, India, June 6 - 10, 2022}, pages = {17--18}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3489048.3522640}, doi = {10.1145/3489048.3522640}, timestamp = {Wed, 01 Mar 2023 21:16:34 +0100}, biburl = {https://dblp.org/rec/conf/sigmetrics/Jin0WC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Cronin0WC22, author = {Patrick Cronin and Xing Gao and Haining Wang and Chase Cotton}, title = {Time-Print: Authenticating {USB} Flash Drives with Novel Timing Fingerprints}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {1002--1017}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833595}, doi = {10.1109/SP46214.2022.9833595}, timestamp = {Thu, 21 Sep 2023 15:57:27 +0200}, biburl = {https://dblp.org/rec/conf/sp/Cronin0WC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/LiangGSXW22, author = {Yuan Liang and Xing Gao and Kun Sun and Wenjie Xiong and Haining Wang}, title = {An Investigation on Data Center Cooling Systems Using FPGA-based Temperature Side Channels}, booktitle = {41st International Symposium on Reliable Distributed Systems, {SRDS} 2022, Vienna, Austria, September 19-22, 2022}, pages = {46--57}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SRDS55811.2022.00015}, doi = {10.1109/SRDS55811.2022.00015}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/srds/LiangGSXW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Liu0W022, author = {Guannan Liu and Xing Gao and Haining Wang and Kun Sun}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Exploring the Unchartered Space of Container Registry Typosquatting}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {35--51}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/liu-guannan}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/Liu0W022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/FamiliSWP22, author = {Alireza Famili and Angelos Stavrou and Haining Wang and Jung{-}Min Jerry Park}, title = {{RAIL:} Robust Acoustic Indoor Localization for Drones}, booktitle = {95th {IEEE} Vehicular Technology Conference, {VTC} Spring 2022, Helsinki, Finland, June 19-22, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/VTC2022-Spring54318.2022.9860933}, doi = {10.1109/VTC2022-SPRING54318.2022.9860933}, timestamp = {Wed, 25 Jan 2023 10:28:23 +0100}, biburl = {https://dblp.org/rec/conf/vtc/FamiliSWP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/AtalaySSW22, author = {Tolga O. Atalay and Dragoslav Stojadinovic and Angelos Stavrou and Haining Wang}, title = {Scaling Network Slices with a 5G Testbed: {A} Resource Consumption Study}, booktitle = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2022, Austin, TX, USA, April 10-13, 2022}, pages = {2649--2654}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/WCNC51071.2022.9771860}, doi = {10.1109/WCNC51071.2022.9771860}, timestamp = {Tue, 24 May 2022 15:39:22 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/AtalaySSW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-10488, author = {Alireza Famili and Angelos Stavrou and Haining Wang and Jung{-}Min Jerry Park}, title = {{PILOT:} High-Precision Indoor Localization for Autonomous Drones}, journal = {CoRR}, volume = {abs/2201.10488}, year = {2022}, url = {https://arxiv.org/abs/2201.10488}, eprinttype = {arXiv}, eprint = {2201.10488}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-10488.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-10691, author = {Alireza Famili and Angelos Stavrou and Haining Wang and Jung{-}Min Park}, title = {{OPTILOD:} Optimal Beacon Placement for High-Accuracy Indoor Localization of Drones}, journal = {CoRR}, volume = {abs/2201.10691}, year = {2022}, url = {https://arxiv.org/abs/2201.10691}, eprinttype = {arXiv}, eprint = {2201.10691}, timestamp = {Wed, 02 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-10691.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-04138, author = {Tongyue Shi and Siyu Tao and Haining Wang}, title = {Water Goes Where? {A} Water Resource Allocation Method Based on Multi-Objective Decision-Making}, journal = {CoRR}, volume = {abs/2208.04138}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.04138}, doi = {10.48550/ARXIV.2208.04138}, eprinttype = {arXiv}, eprint = {2208.04138}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-04138.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-07395, author = {Haining Wang and Patrick Juola and Allen Riddell}, title = {Reproduction and Replication of an Adversarial Stylometry Experiment}, journal = {CoRR}, volume = {abs/2208.07395}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.07395}, doi = {10.48550/ARXIV.2208.07395}, eprinttype = {arXiv}, eprint = {2208.07395}, timestamp = {Mon, 22 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-07395.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-02256, author = {Zhengyong Huang and Sijuan Zou and Guoshuai Wang and Zixiang Chen and Hao Shen and Haiyan Wang and Na Zhang and Lu Zhang and Fan Yang and Haining Wang and Dong Liang and Tianye Niu and Xiaohua Zhu and Zhanli Hu}, title = {ISA-Net: Improved spatial attention network for {PET-CT} tumor segmentation}, journal = {CoRR}, volume = {abs/2211.02256}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.02256}, doi = {10.48550/ARXIV.2211.02256}, eprinttype = {arXiv}, eprint = {2211.02256}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-02256.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-11465, author = {Tolga O. Atalay and Sudip Maitra and Dragoslav Stojadinovic and Angelos Stavrou and Haining Wang}, title = {Securing 5G OpenRAN with a Scalable Authorization Framework for xApps}, journal = {CoRR}, volume = {abs/2212.11465}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.11465}, doi = {10.48550/ARXIV.2212.11465}, eprinttype = {arXiv}, eprint = {2212.11465}, timestamp = {Wed, 04 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-11465.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WuHWYLLYL21, author = {Jiajia Wu and Guangliang Han and Haining Wang and Hang Yang and Qingqing Li and Dongxu Liu and Fangjian Ye and Peixun Liu}, title = {Progressive Guided Fusion Network With Multi-Modal and Multi-Scale Attention for {RGB-D} Salient Object Detection}, journal = {{IEEE} Access}, volume = {9}, pages = {150608--150622}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3126338}, doi = {10.1109/ACCESS.2021.3126338}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/WuHWYLLYL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/TangLLSWQ21, author = {Yutao Tang and Yue Li and Qun Li and Kun Sun and Haining Wang and Zhengrui Qin}, title = {User input enrichment via sensing devices}, journal = {Comput. Networks}, volume = {196}, pages = {108262}, year = {2021}, url = {https://doi.org/10.1016/j.comnet.2021.108262}, doi = {10.1016/J.COMNET.2021.108262}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/TangLLSWQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/displays/LuHW21, author = {Baoli Lu and Yu He and Haining Wang}, title = {Stereo disparity optimization with depth change constraint based on a continuous video}, journal = {Displays}, volume = {69}, pages = {102073}, year = {2021}, url = {https://doi.org/10.1016/j.displa.2021.102073}, doi = {10.1016/J.DISPLA.2021.102073}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/displays/LuHW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/displays/WangWLW21, author = {Changshuo Wang and Chen Wang and Weijun Li and Haining Wang}, title = {A brief survey on {RGB-D} semantic segmentation using deep learning}, journal = {Displays}, volume = {70}, pages = {102080}, year = {2021}, url = {https://doi.org/10.1016/j.displa.2021.102080}, doi = {10.1016/J.DISPLA.2021.102080}, timestamp = {Mon, 30 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/displays/WangWLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pomacs/JinHWC21, author = {Lin Jin and Shuai Hao and Haining Wang and Chase Cotton}, title = {Understanding the Practices of Global Censorship through Accurate, End-to-End Measurements}, journal = {Proc. {ACM} Meas. Anal. Comput. Syst.}, volume = {5}, number = {3}, pages = {43:1--43:25}, year = {2021}, url = {https://doi.org/10.1145/3491055}, doi = {10.1145/3491055}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pomacs/JinHWC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/XiaoLHW21, author = {Jidong Xiao and Lei Lu and Hai Huang and Haining Wang}, title = {Virtual Machine Extrospection: {A} Reverse Information Retrieval in Clouds}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {9}, number = {1}, pages = {401--413}, year = {2021}, url = {https://doi.org/10.1109/TCC.2018.2855143}, doi = {10.1109/TCC.2018.2855143}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcc/XiaoLHW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GaoSGKPW21, author = {Xing Gao and Benjamin Steenkamer and Zhongshu Gu and Mehmet Kayaalp and Dimitrios Pendarakis and Haining Wang}, title = {A Study on the Security Implications of Information Leakages in Container Clouds}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {174--191}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2018.2879605}, doi = {10.1109/TDSC.2018.2879605}, timestamp = {Fri, 25 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/GaoSGKPW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/LiWTSWSL21, author = {Qiang Li and Zhihao Wang and Dawei Tan and Jinke Song and Haining Wang and Limin Sun and Jiqiang Liu}, title = {GeoCAM: An IP-Based Geolocation Service Through Fine-Grained and Stable Webcam Landmarks}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {29}, number = {4}, pages = {1798--1812}, year = {2021}, url = {https://doi.org/10.1109/TNET.2021.3073926}, doi = {10.1109/TNET.2021.3073926}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/LiWTSWSL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Cronin0WC21, author = {Patrick Cronin and Xing Gao and Haining Wang and Chase Cotton}, title = {An Exploration of {ARM} System-Level Cache and {GPU} Side Channels}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {784--795}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485902}, doi = {10.1145/3485832.3485902}, timestamp = {Tue, 07 Dec 2021 18:41:40 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Cronin0WC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ahfe/YuCLWH21, author = {Ruyang Yu and Yuan Cao and Xinyi Li and Haining Wang and Renke He}, editor = {Francisco Rebelo}, title = {The Stability of Headphones}, booktitle = {Advances in Ergonomics in Design - Proceedings of the {AHFE} 2021 Virtual Conference on Ergonomics in Design, July 25-29, 2021, {USA}}, series = {Lecture Notes in Networks and Systems}, volume = {261}, pages = {249--257}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-79760-7\_30}, doi = {10.1007/978-3-030-79760-7\_30}, timestamp = {Tue, 24 Aug 2021 14:31:43 +0200}, biburl = {https://dblp.org/rec/conf/ahfe/YuCLWH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ahfe/LiWYCH21, author = {Xinyi Li and Haining Wang and Ruyang Yu and Yuan Cao and Renke He}, editor = {Francisco Rebelo}, title = {Naturalistic Data Collection of Head Movements During Headphone Use}, booktitle = {Advances in Ergonomics in Design - Proceedings of the {AHFE} 2021 Virtual Conference on Ergonomics in Design, July 25-29, 2021, {USA}}, series = {Lecture Notes in Networks and Systems}, volume = {261}, pages = {331--338}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-79760-7\_40}, doi = {10.1007/978-3-030-79760-7\_40}, timestamp = {Tue, 24 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ahfe/LiWYCH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chr/WangXR21, author = {Haining Wang and Xin Xie and Allen Riddell}, editor = {Maud Ehrmann and Folgert Karsdorp and Melvin Wevers and Tara Lee Andrews and Manuel Burghardt and Mike Kestemont and Enrique Manjavacas and Michael Piotrowski and Joris van Zundert}, title = {The Challenge of Vernacular and Classical Chinese Cross-Register Authorship Attribution}, booktitle = {Proceedings of the Conference on Computational Humanities Research, CHR2021, Amsterdam, The Netherlands, November 17-19, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2989}, pages = {299--309}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2989/long\_paper41.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:31 +0100}, biburl = {https://dblp.org/rec/conf/chr/WangXR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/LiWW0LJRC21, author = {Yue Li and Zhenyu Wu and Haining Wang and Kun Sun and Zhichun Li and Kangkook Jee and Junghwan Rhee and Haifeng Chen}, editor = {Anupam Joshi and Barbara Carminati and Rakesh M. Verma}, title = {UTrack: Enterprise User Tracking Based on OS-Level Audit Logs}, booktitle = {{CODASPY} '21: Eleventh {ACM} Conference on Data and Application Security and Privacy, Virtual Event, USA, April 26-28, 2021}, pages = {161--172}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3422337.3447831}, doi = {10.1145/3422337.3447831}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/LiWW0LJRC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/LiSTWL21, author = {Qiang Li and Jinke Song and Dawei Tan and Haining Wang and Jiqiang Liu}, title = {PDGraph: {A} Large-Scale Empirical Study on Project Dependency of Security Vulnerabilities}, booktitle = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2021, Taipei, Taiwan, June 21-24, 2021}, pages = {161--173}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSN48987.2021.00031}, doi = {10.1109/DSN48987.2021.00031}, timestamp = {Mon, 09 Aug 2021 14:50:25 +0200}, biburl = {https://dblp.org/rec/conf/dsn/LiSTWL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/ConnellyR0XWS21, author = {Joseph Connelly and Taylor Roberts and Xing Gao and Jidong Xiao and Haining Wang and Angelos Stavrou}, title = {CloudSkulk: {A} Nested Virtual Machine Based Rootkit and Its Detection}, booktitle = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2021, Taipei, Taiwan, June 21-24, 2021}, pages = {350--362}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSN48987.2021.00047}, doi = {10.1109/DSN48987.2021.00047}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dsn/ConnellyR0XWS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eacl/WangRJ21, author = {Haining Wang and Allen Riddell and Patrick Juola}, editor = {Paola Merlo and J{\"{o}}rg Tiedemann and Reut Tsarfaty}, title = {Mode Effects' Challenge to Authorship Attribution}, booktitle = {Proceedings of the 16th Conference of the European Chapter of the Association for Computational Linguistics: Main Volume, {EACL} 2021, Online, April 19 - 23, 2021}, pages = {1146--1155}, publisher = {Association for Computational Linguistics}, year = {2021}, url = {https://doi.org/10.18653/v1/2021.eacl-main.97}, doi = {10.18653/V1/2021.EACL-MAIN.97}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eacl/WangRJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/YangDZHWZD21, author = {Hao Yang and Kun Du and Yubao Zhang and Shuai Hao and Haining Wang and Jia Zhang and Haixin Duan}, editor = {Elisa Bertino and Haya Schulmann and Michael Waidner}, title = {Mingling of Clear and Muddy Water: Understanding and Detecting Semantic Confusion in Blackhat {SEO}}, booktitle = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12972}, pages = {263--284}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88418-5\_13}, doi = {10.1007/978-3-030-88418-5\_13}, timestamp = {Tue, 17 Oct 2023 10:41:56 +0200}, biburl = {https://dblp.org/rec/conf/esorics/YangDZHWZD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/JinHHWC21, author = {Lin Jin and Shuai Hao and Yan Huang and Haining Wang and Chase Cotton}, title = {DNSonChain: Delegating Privacy-Preserved {DNS} Resolution to Blockchain}, booktitle = {29th {IEEE} International Conference on Network Protocols, {ICNP} 2021, Dallas, TX, USA, November 1-5, 2021}, pages = {1--11}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICNP52444.2021.9651951}, doi = {10.1109/ICNP52444.2021.9651951}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icnp/JinHHWC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ranlp/RiddellWJ21, author = {Allen Riddell and Haining Wang and Patrick Juola}, editor = {Galia Angelova and Maria Kunilovskaya and Ruslan Mitkov and Ivelina Nikolova{-}Koleva}, title = {A Call for Clarity in Contemporary Authorship Attribution Evaluation}, booktitle = {Proceedings of the International Conference on Recent Advances in Natural Language Processing {(RANLP} 2021), Held Online, 1-3 September, 2021}, pages = {1174--1179}, publisher = {{INCOMA} Ltd.}, year = {2021}, url = {https://aclanthology.org/2021.ranlp-1.132}, timestamp = {Mon, 13 Nov 2023 12:27:35 +0100}, biburl = {https://dblp.org/rec/conf/ranlp/RiddellWJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/HouserH0LCW21, author = {Rebekah Houser and Shuai Hao and Zhou Li and Daiping Liu and Chase Cotton and Haining Wang}, title = {A Comprehensive Measurement-based Investigation of {DNS} Hijacking}, booktitle = {40th International Symposium on Reliable Distributed Systems, {SRDS} 2021, Chicago, IL, USA, September 20-23, 2021}, pages = {210--221}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SRDS53918.2021.00029}, doi = {10.1109/SRDS53918.2021.00029}, timestamp = {Mon, 10 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/srds/HouserH0LCW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Cronin0YW21, author = {Patrick Cronin and Xing Gao and Chengmo Yang and Haining Wang}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Charger-Surfing: Exploiting a Power Line Side-Channel for Smartphone Information Leakage}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {681--698}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/cronin}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/Cronin0YW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/Liu0W21, author = {Guannan Liu and Xing Gao and Haining Wang}, editor = {Jure Leskovec and Marko Grobelnik and Marc Najork and Jie Tang and Leila Zia}, title = {An Investigation of Identity-Account Inconsistency in Single Sign-On}, booktitle = {{WWW} '21: The Web Conference 2021, Virtual Event / Ljubljana, Slovenia, April 19-23, 2021}, pages = {105--117}, publisher = {{ACM} / {IW3C2}}, year = {2021}, url = {https://doi.org/10.1145/3442381.3450085}, doi = {10.1145/3442381.3450085}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/Liu0W21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/JinHWC21, author = {Lin Jin and Shuai Hao and Haining Wang and Chase Cotton}, editor = {Jure Leskovec and Marko Grobelnik and Marc Najork and Jie Tang and Leila Zia}, title = {Understanding the Impact of Encrypted {DNS} on Internet Censorship}, booktitle = {{WWW} '21: The Web Conference 2021, Virtual Event / Ljubljana, Slovenia, April 19-23, 2021}, pages = {484--495}, publisher = {{ACM} / {IW3C2}}, year = {2021}, url = {https://doi.org/10.1145/3442381.3450084}, doi = {10.1145/3442381.3450084}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/JinHWC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/XieCWXWGL20, author = {Zhiwei Xie and Yandong Chen and Wenhua Wu and Yuancan Xu and Haining Wang and Jian Guo and An Luo}, title = {Modeling and Control Parameters Design for Grid-Connected Inverter System Considering the Effect of {PLL} and Grid Impedance}, journal = {{IEEE} Access}, volume = {8}, pages = {40474--40484}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2019.2950933}, doi = {10.1109/ACCESS.2019.2950933}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/XieCWXWGL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csm/WangFESGWLPYC20, author = {Yue Wang and Ray Forbes and Uri Elzur and John Strassner and Antonio Gamelas and Haining Wang and Shucheng Liu and Luca Pesando and Xiangfeng Yuan and Shengming Cai}, title = {From Design to Practice: {ETSI} {ENI} Reference Architecture and Instantiation for Network Management and Orchestration Using Artificial Intelligence}, journal = {{IEEE} Commun. Stand. Mag.}, volume = {4}, number = {3}, pages = {38--45}, year = {2020}, url = {https://doi.org/10.1109/MCOMSTD.001.1900039}, doi = {10.1109/MCOMSTD.001.1900039}, timestamp = {Tue, 06 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csm/WangFESGWLPYC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pomacs/SongLWS20, author = {Jinke Song and Qiang Li and Haining Wang and Limin Sun}, title = {Under the Concealing Surface: Detecting and Understanding Live Webcams in the Wild}, journal = {Proc. {ACM} Meas. Anal. Comput. Syst.}, volume = {4}, number = {1}, pages = {05:1--05:25}, year = {2020}, url = {https://doi.org/10.1145/3379471}, doi = {10.1145/3379471}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pomacs/SongLWS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangXHWZJ20, author = {Yubao Zhang and Jidong Xiao and Shuai Hao and Haining Wang and Sencun Zhu and Sushil Jajodia}, title = {Understanding the Manipulation on Recommender Systems through Web Injection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3807--3818}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2954737}, doi = {10.1109/TIFS.2019.2954737}, timestamp = {Mon, 10 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhangXHWZJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/LiCLW20, author = {Gaoxiang Li and Yandong Chen and An Luo and Haining Wang}, title = {An Enhancing Grid Stiffness Control Strategy of {STATCOM/BESS} for Damping Sub-Synchronous Resonance in Wind Farm Connected to Weak Grid}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {16}, number = {9}, pages = {5835--5845}, year = {2020}, url = {https://doi.org/10.1109/TII.2019.2960863}, doi = {10.1109/TII.2019.2960863}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/LiCLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DuYZDWH0020, author = {Kun Du and Hao Yang and Yubao Zhang and Haixin Duan and Haining Wang and Shuang Hao and Zhou Li and Min Yang}, title = {Understanding Promotion-as-a-Service on GitHub}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {597--610}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427258}, doi = {10.1145/3427228.3427258}, timestamp = {Tue, 15 Dec 2020 12:22:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DuYZDWH0020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/ZhangHW20, author = {Yubao Zhang and Shuai Hao and Haining Wang}, editor = {Noseong Park and Kun Sun and Sara Foresti and Kevin R. B. Butler and Nitesh Saxena}, title = {Review Trade: Everything Is Free in Incentivized Review Groups}, booktitle = {Security and Privacy in Communication Networks - 16th {EAI} International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {335}, pages = {339--359}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-63086-7\_19}, doi = {10.1007/978-3-030-63086-7\_19}, timestamp = {Mon, 10 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/ZhangHW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmetrics/SongLWS20, author = {Jinke Song and Qiang Li and Haining Wang and Limin Sun}, editor = {Edmund Yeh and Athina Markopoulou and Y. C. Tay}, title = {Under the Concealing Surface: Detecting and Understanding Live Webcams in the Wild}, booktitle = {Abstracts of the 2020 SIGMETRICS/Performance Joint International Conference on Measurement and Modeling of Computer Systems, Boston, MA, USA, June, 8-12, 2020}, pages = {77--78}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3393691.3394220}, doi = {10.1145/3393691.3394220}, timestamp = {Mon, 02 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigmetrics/SongLWS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/WangLSWS20, author = {Zhihao Wang and Qiang Li and Jinke Song and Haining Wang and Limin Sun}, editor = {Yennun Huang and Irwin King and Tie{-}Yan Liu and Maarten van Steen}, title = {Towards IP-based Geolocation via Fine-grained and Stable Webcam Landmarks}, booktitle = {{WWW} '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020}, pages = {1422--1432}, publisher = {{ACM} / {IW3C2}}, year = {2020}, url = {https://doi.org/10.1145/3366423.3380216}, doi = {10.1145/3366423.3380216}, timestamp = {Fri, 25 Dec 2020 01:14:58 +0100}, biburl = {https://dblp.org/rec/conf/www/WangLSWS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MaDWXJSW19, author = {Zhanyu Ma and Yifeng Ding and Shaoguo Wen and Jiyang Xie and Yifeng Jin and Zhongwei Si and Haining Wang}, title = {Shoe-Print Image Retrieval With Multi-Part Weighted {CNN}}, journal = {{IEEE} Access}, volume = {7}, pages = {59728--59736}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2914455}, doi = {10.1109/ACCESS.2019.2914455}, timestamp = {Tue, 14 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/MaDWXJSW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/BianHWDDC19, author = {Rui Bian and Shuai Hao and Haining Wang and Amogh Dhamdhere and Alberto Dainotti and Chase Cotton}, title = {Towards passive analysis of anycast in global routing: unintended impact of remote peering}, journal = {Comput. Commun. Rev.}, volume = {49}, number = {3}, pages = {18--25}, year = {2019}, url = {https://doi.org/10.1145/3371927.3371930}, doi = {10.1145/3371927.3371930}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccr/BianHWDDC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/LiWS19, author = {Yue Li and Haining Wang and Kun Sun}, title = {BluePass: {A} Mobile Device Assisted Password Manager}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {5}, number = {17}, pages = {e3}, year = {2019}, url = {https://doi.org/10.4108/eai.10-1-2019.156244}, doi = {10.4108/EAI.10-1-2019.156244}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/LiWS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/SongWZW19, author = {Yang Song and Chen Wu and Sencun Zhu and Haining Wang}, title = {A Machine Learning Based Approach for Mobile App Rating Manipulation Detection}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {5}, number = {18}, pages = {e3}, year = {2019}, url = {https://doi.org/10.4108/eai.8-4-2019.157415}, doi = {10.4108/EAI.8-4-2019.157415}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/SongWZW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/YangDZH0LWDSSLG19, author = {Hao Yang and Kun Du and Yubao Zhang and Shuang Hao and Zhou Li and Mingxuan Liu and Haining Wang and Hai{-}Xin Duan and Yazhou Shi and XiaoDong Su and Guang Liu and Zhifeng Geng and Jianping Wu}, editor = {David Balenson}, title = {Casino royale: a deep exploration of illegal online gambling}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {500--513}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359817}, doi = {10.1145/3359789.3359817}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/YangDZH0LWDSSLG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/Houser0CW19, author = {Rebekah Houser and Zhou Li and Chase Cotton and Haining Wang}, editor = {Aziz Mohaisen and Zhi{-}Li Zhang}, title = {An investigation on information leakage of {DNS} over {TLS}}, booktitle = {Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies, CoNEXT 2019, Orlando, FL, USA, December 09-12, 2019}, pages = {123--137}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359989.3365429}, doi = {10.1145/3359989.3365429}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/conext/Houser0CW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/WangHZ19, author = {Haining Wang and Jimmy Huang and Zhewei Zhang}, editor = {Helmut Krcmar and Jane Fedorowicz and Wai Fong Boh and Jan Marco Leimeister and Sunil Wattal}, title = {The Impact of Deep Learning on Organizational Agility}, booktitle = {Proceedings of the 40th International Conference on Information Systems, {ICIS} 2019, Munich, Germany, December 15-18, 2019}, publisher = {Association for Information Systems}, year = {2019}, url = {https://aisel.aisnet.org/icis2019/governance\_is/governance\_is/26}, timestamp = {Tue, 10 Dec 2019 12:03:30 +0100}, biburl = {https://dblp.org/rec/conf/icis/WangHZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/JinHWC19, author = {Lin Jin and Shuai Hao and Haining Wang and Chase Cotton}, title = {Unveil the Hidden Presence: Characterizing the Backend Interface of Content Delivery Networks}, booktitle = {27th {IEEE} International Conference on Network Protocols, {ICNP} 2019, Chicago, IL, USA, October 8-10, 2019}, pages = {1--11}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICNP.2019.8888058}, doi = {10.1109/ICNP.2019.8888058}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icnp/JinHWC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/FengL0W0YZS19, author = {Xuan Feng and Xiaojing Liao and XiaoFeng Wang and Haining Wang and Qiang Li and Kai Yang and Hongsong Zhu and Limin Sun}, editor = {Nadia Heninger and Patrick Traynor}, title = {Understanding and Securing Device Vulnerabilities through Automated Bug Report Analysis}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {887--903}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/feng}, timestamp = {Mon, 01 Feb 2021 08:43:12 +0100}, biburl = {https://dblp.org/rec/conf/uss/FengL0W0YZS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csm/WangFCWGWSCL18, author = {Yue Wang and Ray Forbes and Chris Cavigioli and Haining Wang and Antonio Gamelas and Archie Wade and John Strassner and Shengming Cai and Shucheng Liu}, title = {Network Management and Orchestration Using Artificial Intelligence: Overview of {ETSI} {ENI}}, journal = {{IEEE} Commun. Stand. Mag.}, volume = {2}, number = {4}, pages = {58--65}, year = {2018}, url = {https://doi.org/10.1109/MCOMSTD.2018.1800033}, doi = {10.1109/MCOMSTD.2018.1800033}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csm/WangFCWGWSCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LiFWS18, author = {Qiang Li and Xuan Feng and Haining Wang and Limin Sun}, title = {Understanding the Usage of Industrial Control System Devices on the Internet}, journal = {{IEEE} Internet Things J.}, volume = {5}, number = {3}, pages = {2178--2189}, year = {2018}, url = {https://doi.org/10.1109/JIOT.2018.2826558}, doi = {10.1109/JIOT.2018.2826558}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/LiFWS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangLSW18, author = {Fengwei Zhang and Kevin Leach and Angelos Stavrou and Haining Wang}, title = {Towards Transparent Debugging}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {2}, pages = {321--335}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2545671}, doi = {10.1109/TDSC.2016.2545671}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangLSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/ChuGW18, author = {Zi Chu and Steven Gianvecchio and Haining Wang}, editor = {Pierangela Samarati and Indrajit Ray and Indrakshi Ray}, title = {Bot or Human? {A} Behavior-Based Online Bot Detection System}, booktitle = {From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday}, series = {Lecture Notes in Computer Science}, volume = {11170}, pages = {432--449}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-04834-1\_21}, doi = {10.1007/978-3-030-04834-1\_21}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/birthday/ChuGW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuZW18, author = {Daiping Liu and Mingwei Zhang and Haining Wang}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {A Robust and Efficient Defense against Use-after-Free Exploits via Concurrent Pointer Sweeping}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {1635--1648}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243826}, doi = {10.1145/3243734.3243826}, timestamp = {Fri, 06 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LiuZW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/JinHWC18, author = {Lin Jin and Shuai Hao and Haining Wang and Chase Cotton}, title = {Your Remnant Tells Secret: Residual Resolution in DDoS Protection Services}, booktitle = {48th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2018, Luxembourg City, Luxembourg, June 25-28, 2018}, pages = {362--373}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/DSN.2018.00046}, doi = {10.1109/DSN.2018.00046}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dsn/JinHWC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/XuLCCYLWS18, author = {Haitao Xu and Zhao Li and Chen Chu and Yuanmi Chen and Yifan Yang and Haifeng Lu and Haining Wang and Angelos Stavrou}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Detecting and Characterizing Web Bot Traffic in a Large E-commerce Marketplace}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, pages = {143--163}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1\_8}, doi = {10.1007/978-3-319-98989-1\_8}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/XuLCCYLWS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/WangCLYYB18, author = {Haining Wang and Wanrong Chen and Yi Li and Yang Yu and Wenxiu Yang and Roger Ball}, editor = {Pei{-}Luen Patrick Rau}, title = {A 3D Head Model Fitting Method Using Chinese Head Anthropometric Data}, booktitle = {Cross-Cultural Design. Methods, Tools, and Users - 10th International Conference, {CCD} 2018, Held as Part of {HCI} International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10911}, pages = {203--215}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-92141-9\_16}, doi = {10.1007/978-3-319-92141-9\_16}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/hci/WangCLYYB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/WangYCYB18, author = {Haining Wang and Yang Yu and Wanrong Chen and Wenxiu Yang and Roger Ball}, editor = {Pei{-}Luen Patrick Rau}, title = {Responsive Web Design for Chinese Head and Facial Database}, booktitle = {Cross-Cultural Design. Methods, Tools, and Users - 10th International Conference, {CCD} 2018, Held as Part of {HCI} International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10911}, pages = {216--231}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-92141-9\_17}, doi = {10.1007/978-3-319-92141-9\_17}, timestamp = {Wed, 11 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hci/WangYCYB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/LiFWS18, author = {Qiang Li and Xuan Feng and Haining Wang and Limin Sun}, title = {Discovery of Internet of Thing devices based on rules}, booktitle = {{IEEE} {INFOCOM} 2018 - {IEEE} Conference on Computer Communications Workshops, {INFOCOM} Workshops 2018, Honolulu, HI, USA, April 15-19, 2018}, pages = {1--2}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/INFCOMW.2018.8406843}, doi = {10.1109/INFCOMW.2018.8406843}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/LiFWS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/0002WS18, author = {Yue Li and Haining Wang and Kun Sun}, title = {Email as a Master Key: Analyzing Account Recovery in the Wild}, booktitle = {2018 {IEEE} Conference on Computer Communications, {INFOCOM} 2018, Honolulu, HI, USA, April 16-19, 2018}, pages = {1646--1654}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/INFOCOM.2018.8486017}, doi = {10.1109/INFOCOM.2018.8486017}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/0002WS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/XuHSW18, author = {Haitao Xu and Shuai Hao and Alparslan Sari and Haining Wang}, title = {Privacy Risk Assessment on Email Tracking}, booktitle = {2018 {IEEE} Conference on Computer Communications, {INFOCOM} 2018, Honolulu, HI, USA, April 16-19, 2018}, pages = {2519--2527}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/INFOCOM.2018.8486432}, doi = {10.1109/INFOCOM.2018.8486432}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/XuHSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/LiFW0S18, author = {Qiang Li and Xuan Feng and Haining Wang and Zhi Li and Limin Sun}, title = {Towards Fine-grained Fingerprinting of Firmware in Online Embedded Devices}, booktitle = {2018 {IEEE} Conference on Computer Communications, {INFOCOM} 2018, Honolulu, HI, USA, April 16-19, 2018}, pages = {2537--2545}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/INFOCOM.2018.8486326}, doi = {10.1109/INFOCOM.2018.8486326}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/LiFW0S18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/GaoXWLW18, author = {Xing Gao and Zhang Xu and Haining Wang and Li Li and Xiaorui Wang}, title = {Reduced Cooling Redundancy: {A} New Security Vulnerability in a Hot Data Center}, booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS} 2018, San Diego, California, USA, February 18-21, 2018}, publisher = {The Internet Society}, year = {2018}, url = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_06A-1\_Gao\_paper.pdf}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/GaoXWLW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Feng0WS18, author = {Xuan Feng and Qiang Li and Haining Wang and Limin Sun}, editor = {William Enck and Adrienne Porter Felt}, title = {Acquisitional Rule-based Engine for Discovering Internet-of-Thing Devices}, booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore, MD, USA, August 15-17, 2018}, pages = {327--341}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/feng}, timestamp = {Mon, 01 Feb 2021 08:43:20 +0100}, biburl = {https://dblp.org/rec/conf/uss/Feng0WS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HaoZWS18, author = {Shuai Hao and Yubao Zhang and Haining Wang and Angelos Stavrou}, editor = {William Enck and Adrienne Porter Felt}, title = {End-Users Get Maneuvered: Empirical Analysis of Redirection Hijacking in Content Delivery Networks}, booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore, MD, USA, August 15-17, 2018}, pages = {1129--1145}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/hao}, timestamp = {Mon, 10 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/HaoZWS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/HaoW17, author = {Shuai Hao and Haining Wang}, title = {Exploring Domain Name Based Features on the Effectiveness of {DNS} Caching}, journal = {Comput. Commun. Rev.}, volume = {47}, number = {1}, pages = {36--42}, year = {2017}, url = {https://doi.org/10.1145/3041027.3041032}, doi = {10.1145/3041027.3041032}, timestamp = {Mon, 10 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccr/HaoW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/BalenBW17, author = {Nicolas Van Balen and Christopher T. Ball and Haining Wang}, title = {Analysis of Targeted Mouse Movements for Gender Classification}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {11}, pages = {e3}, year = {2017}, url = {https://doi.org/10.4108/eai.7-12-2017.153395}, doi = {10.4108/EAI.7-12-2017.153395}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/BalenBW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangRWWH17, author = {Yubao Zhang and Xin Ruan and Haining Wang and Hui Wang and Su He}, title = {Twitter Trends Manipulation: {A} First Look Inside the Security of Twitter Trending}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {1}, pages = {144--156}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2604226}, doi = {10.1109/TIFS.2016.2604226}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangRWWH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiWS17, author = {Yue Li and Haining Wang and Kun Sun}, title = {Personal Information in Passwords and Its Security Implications}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {10}, pages = {2320--2333}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2705627}, doi = {10.1109/TIFS.2017.2705627}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiWS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tweb/XuLWS17, author = {Haitao Xu and Daiping Liu and Haining Wang and Angelos Stavrou}, title = {An Empirical Investigation of Ecommerce-Reputation-Escalation-as-a-Service}, journal = {{ACM} Trans. Web}, volume = {11}, number = {2}, pages = {13:1--13:35}, year = {2017}, url = {https://doi.org/10.1145/2983646}, doi = {10.1145/2983646}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tweb/XuLWS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuLDWLD17, author = {Daiping Liu and Zhou Li and Kun Du and Haining Wang and Baojun Liu and Hai{-}Xin Duan}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Don't Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {537--552}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134049}, doi = {10.1145/3133956.3134049}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LiuLDWLD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/GaoGKPW17, author = {Xing Gao and Zhongshu Gu and Mehmet Kayaalp and Dimitrios Pendarakis and Haining Wang}, title = {ContainerLeaks: Emerging Security Threats of Information Leakages in Container Clouds}, booktitle = {47th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2017, Denver, CO, USA, June 26-29, 2017}, pages = {237--248}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/DSN.2017.49}, doi = {10.1109/DSN.2017.49}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/GaoGKPW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/LiuGZWS17, author = {Daiping Liu and Xing Gao and Mingwei Zhang and Haining Wang and Angelos Stavrou}, title = {Detecting Passive Cheats in Online Games via Performance-Skillfulness Inconsistency}, booktitle = {47th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2017, Denver, CO, USA, June 26-29, 2017}, pages = {615--626}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/DSN.2017.20}, doi = {10.1109/DSN.2017.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/LiuGZWS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/WangSD17, author = {Haining Wang and Priyesh Shetty and Zhi Ding}, title = {Low Complexity Node Clustering in Cloud-RAN for Service Provisioning and Resource Allocation}, booktitle = {2017 {IEEE} Global Communications Conference, {GLOBECOM} 2017, Singapore, December 4-8, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/GLOCOM.2017.8254979}, doi = {10.1109/GLOCOM.2017.8254979}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/WangSD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/LiZWSF17, author = {Yue Li and Nan Zheng and Haining Wang and Kun Sun and Hui Fang}, title = {A measurement study on Amazon wishlist and its privacy exposure}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2017, Paris, France, May 21-25, 2017}, pages = {1--7}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICC.2017.7996684}, doi = {10.1109/ICC.2017.7996684}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/LiZWSF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/GaoLLWS17, author = {Xing Gao and Dachuan Liu and Daiping Liu and Haining Wang and Angelos Stavrou}, editor = {Kisung Lee and Ling Liu}, title = {E-Android: {A} New Energy Profiling Tool for Smartphones}, booktitle = {37th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2017, Atlanta, GA, USA, June 5-8, 2017}, pages = {492--502}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ICDCS.2017.218}, doi = {10.1109/ICDCS.2017.218}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/GaoLLWS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/LiuGW17, author = {Dachuan Liu and Xing Gao and Haining Wang}, editor = {Kisung Lee and Ling Liu}, title = {Location Privacy Breach: Apps Are Watching You in Background}, booktitle = {37th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2017, Atlanta, GA, USA, June 5-8, 2017}, pages = {2423--2429}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ICDCS.2017.227}, doi = {10.1109/ICDCS.2017.227}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/LiuGW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsys/LiFWS17, author = {Qiang Li and Xuan Feng and Haining Wang and Limin Sun}, title = {Automatically Discovering Surveillance Devices in the Cyberspace}, booktitle = {Proceedings of the 8th {ACM} on Multimedia Systems Conference, MMSys 2017, Taipei, Taiwan, June 20-23, 2017}, pages = {331--342}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3083187.3084020}, doi = {10.1145/3083187.3084020}, timestamp = {Tue, 06 Nov 2018 11:07:10 +0100}, biburl = {https://dblp.org/rec/conf/mmsys/LiFWS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/0002WS17, author = {Yue Li and Haining Wang and Kun Sun}, editor = {Xiaodong Lin and Ali A. Ghorbani and Kui Ren and Sencun Zhu and Aiqing Zhang}, title = {BluePass: {A} Secure Hand-Free Password Manager}, booktitle = {Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {238}, pages = {185--205}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-78813-5\_10}, doi = {10.1007/978-3-319-78813-5\_10}, timestamp = {Wed, 22 Dec 2021 13:40:59 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/0002WS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmetrics/GaoXWLW17, author = {Xing Gao and Zhang Xu and Haining Wang and Li Li and Xiaorui Wang}, editor = {Bruce E. Hajek and Sewoong Oh and Augustin Chaintreau and Leana Golubchik and Zhi{-}Li Zhang}, title = {Why "Some" Like It Hot Too: Thermal Attack on Data Centers}, booktitle = {Proceedings of the 2017 {ACM} {SIGMETRICS} / International Conference on Measurement and Modeling of Computer Systems, Urbana-Champaign, IL, USA, June 05 - 09, 2017}, pages = {23--24}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3078505.3078545}, doi = {10.1145/3078505.3078545}, timestamp = {Fri, 30 Jul 2021 16:13:32 +0200}, biburl = {https://dblp.org/rec/conf/sigmetrics/GaoXWLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RuanWWJ16, author = {Xin Ruan and Zhenyu Wu and Haining Wang and Sushil Jajodia}, title = {Profiling Online Social Behaviors for Compromised Account Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {1}, pages = {176--187}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2482465}, doi = {10.1109/TIFS.2015.2482465}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RuanWWJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ZhengPW16, author = {Nan Zheng and Aaron Paloski and Haining Wang}, title = {An Efficient User Verification System Using Angle-Based Mouse Movement Biometrics}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {18}, number = {3}, pages = {11:1--11:27}, year = {2016}, url = {https://doi.org/10.1145/2893185}, doi = {10.1145/2893185}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ZhengPW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/RenQZWN16, author = {Zhen Ren and Xin Qi and Gang Zhou and Haining Wang and David T. Nguyen}, title = {Throughput Assurance for Multiple Body Sensor Networks}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {27}, number = {2}, pages = {546--557}, year = {2016}, url = {https://doi.org/10.1109/TPDS.2015.2408611}, doi = {10.1109/TPDS.2015.2408611}, timestamp = {Mon, 05 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/RenQZWN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/WangZD16, author = {Haining Wang and Chenxi Zhu and Zhi Ding}, title = {Femtocell Power Control for Interference Management Based on Macrolayer Feedback}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {65}, number = {7}, pages = {5222--5236}, year = {2016}, url = {https://doi.org/10.1109/TVT.2015.2463718}, doi = {10.1109/TVT.2015.2463718}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/WangZD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/LiuWZML16, author = {Dachuan Liu and Haining Wang and Gang Zhou and Weizhen Mao and Boyang Li}, title = {Arbitrating Traffic Contention for Power Saving with Multiple {PSM} Clients}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {15}, number = {10}, pages = {7030--7043}, year = {2016}, url = {https://doi.org/10.1109/TWC.2016.2595558}, doi = {10.1109/TWC.2016.2595558}, timestamp = {Sun, 27 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/LiuWZML16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuWLJRXXWJ16, author = {Zhang Xu and Zhenyu Wu and Zhichun Li and Kangkook Jee and Junghwan Rhee and Xusheng Xiao and Fengyuan Xu and Haining Wang and Guofei Jiang}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {High Fidelity Data Reduction for Big Data Security Dependency Analyses}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {504--516}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978378}, doi = {10.1145/2976749.2978378}, timestamp = {Tue, 10 Nov 2020 20:00:49 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XuWLJRXXWJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuHW16, author = {Daiping Liu and Shuai Hao and Haining Wang}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {All Your {DNS} Records Point to Us: Understanding the Security Threats of Dangling {DNS} Records}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1414--1425}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978387}, doi = {10.1145/2976749.2978387}, timestamp = {Mon, 10 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiuHW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/GaoLLW16, author = {Xing Gao and Dachuan Liu and Daiping Liu and Haining Wang}, editor = {Elisa Bertino and Ravi S. Sandhu and Alexander Pretschner}, title = {On Energy Security of Smartphones}, booktitle = {Proceedings of the Sixth {ACM} on Conference on Data and Application Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March 9-11, 2016}, pages = {148--150}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2857705.2857738}, doi = {10.1145/2857705.2857738}, timestamp = {Tue, 09 Feb 2021 08:50:28 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/GaoLLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icac/XiaoLWZ16, author = {Jidong Xiao and Lei Lu and Haining Wang and Xiaoyun Zhu}, editor = {Samuel Kounev and Holger Giese and Jie Liu}, title = {HyperLink: Virtual Machine Introspection and Memory Forensic Analysis without Kernel Source Code}, booktitle = {2016 {IEEE} International Conference on Autonomic Computing, {ICAC} 2016, Wuerzburg, Germany, July 17-22, 2016}, pages = {127--136}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ICAC.2016.46}, doi = {10.1109/ICAC.2016.46}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icac/XiaoLWZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/WangD16, author = {Haining Wang and Zhi Ding}, title = {Joint power and rate optimization for co-channel small cells using Frank-Wolfe algorithm}, booktitle = {2016 {IEEE} International Conference on Communications, {ICC} 2016, Kuala Lumpur, Malaysia, May 22-27, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICC.2016.7511345}, doi = {10.1109/ICC.2016.7511345}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/WangD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/FengLWS16, author = {Xuan Feng and Qiang Li and Haining Wang and Limin Sun}, title = {Characterizing industrial control system devices on the Internet}, booktitle = {24th {IEEE} International Conference on Network Protocols, {ICNP} 2016, Singapore, November 8-11, 2016}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ICNP.2016.7784407}, doi = {10.1109/ICNP.2016.7784407}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/FengLWS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/FengLWS16a, author = {Xuan Feng and Qiang Li and Haining Wang and Limin Sun}, title = {{ASCEND:} {A} search engine for online industrial control devices}, booktitle = {24th {IEEE} International Conference on Network Protocols, {ICNP} 2016, Singapore, November 8-11, 2016}, pages = {1--2}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ICNP.2016.7784467}, doi = {10.1109/ICNP.2016.7784467}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/FengLWS16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/LiF0WS16, author = {Qiang Li and Xuan Feng and Zhi Li and Haining Wang and Limin Sun}, title = {{GUIDE:} Graphical user interface fingerprints physical devices}, booktitle = {24th {IEEE} International Conference on Network Protocols, {ICNP} 2016, Singapore, November 8-11, 2016}, pages = {1--2}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ICNP.2016.7784468}, doi = {10.1109/ICNP.2016.7784468}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/LiF0WS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/LiWS16, author = {Yue Li and Haining Wang and Kun Sun}, title = {A study of personal information in human-chosen passwords and its security implications}, booktitle = {35th Annual {IEEE} International Conference on Computer Communications, {INFOCOM} 2016, San Francisco, CA, USA, April 10-14, 2016}, pages = {1--9}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/INFOCOM.2016.7524583}, doi = {10.1109/INFOCOM.2016.7524583}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/LiWS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsys/KoehlW16, author = {Aaron Koehl and Haining Wang}, editor = {Christian Timmerer}, title = {{SERF:} optimization of socially sourced images using psychovisual enhancements}, booktitle = {Proceedings of the 7th International Conference on Multimedia Systems, MMSys 2016, Klagenfurt, Austria, May 10-13, 2016}, pages = {16:1--16:12}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2910017.2910609}, doi = {10.1145/2910017.2910609}, timestamp = {Tue, 06 Nov 2018 11:07:10 +0100}, biburl = {https://dblp.org/rec/conf/mmsys/KoehlW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/BalenBW16, author = {Nicolas Van Balen and Christopher T. Ball and Haining Wang}, editor = {Robert H. Deng and Jian Weng and Kui Ren and Vinod Yegneswaran}, title = {A Behavioral Biometrics Based Approach to Online Gender Classification}, booktitle = {Security and Privacy in Communication Networks - 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {198}, pages = {475--495}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-59608-2\_27}, doi = {10.1007/978-3-319-59608-2\_27}, timestamp = {Tue, 12 May 2020 10:32:53 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/BalenBW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmetrics/LiuGZW16, author = {Daiping Liu and Xing Gao and Mingwei Zhang and Haining Wang}, editor = {Sara Alouf and Alain Jean{-}Marie and Nidhi Hegde and Alexandre Prouti{\`{e}}re}, title = {Shoot for the Moon and You Will Never Miss: Characterizing and Detecting Aimbots in Online Games}, booktitle = {Proceedings of the 2016 {ACM} {SIGMETRICS} International Conference on Measurement and Modeling of Computer Science, Antibes Juan-Les-Pins, France, June 14-18, 2016}, pages = {401--402}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2896377.2901503}, doi = {10.1145/2896377.2901503}, timestamp = {Fri, 06 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigmetrics/LiuGZW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/XiaoLHW16, author = {Jidong Xiao and Lei Lu and Hai Huang and Haining Wang}, editor = {Ajay Gulati and Hakim Weatherspoon}, title = {Hyperprobe: Towards Virtual Machine Extrospection}, booktitle = {2016 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2016, Denver, CO, USA, June 22-24, 2016}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/atc16/technical-sessions/presentation/xiao}, timestamp = {Mon, 01 Feb 2021 17:03:06 +0100}, biburl = {https://dblp.org/rec/conf/usenix/XiaoLHW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/LuZWYGWQ15, author = {Gang Lu and Jianfeng Zhan and Haining Wang and Lin Yuan and Yunwei Gao and Chuliang Weng and Yong Qi}, title = {PowerTracer: Tracing Requests in Multi-Tier Services to Reduce Energy Inefficiency}, journal = {{IEEE} Trans. Computers}, volume = {64}, number = {5}, pages = {1389--1401}, year = {2015}, url = {https://doi.org/10.1109/TC.2014.2315625}, doi = {10.1109/TC.2014.2315625}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/LuZWYGWQ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/WuXW15, author = {Zhenyu Wu and Zhang Xu and Haining Wang}, title = {Whispers in the Hyper-Space: High-Bandwidth and Reliable Covert Channel Attacks Inside the Cloud}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {23}, number = {2}, pages = {603--615}, year = {2015}, url = {https://doi.org/10.1109/TNET.2014.2304439}, doi = {10.1109/TNET.2014.2304439}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/WuXW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/WangD15, author = {Haining Wang and Zhi Ding}, title = {Power Control and Resource Allocation for Outage Balancing in Femtocell Networks}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {14}, number = {4}, pages = {2043--2057}, year = {2015}, url = {https://doi.org/10.1109/TWC.2014.2379282}, doi = {10.1109/TWC.2014.2379282}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/WangD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/WangWD15, author = {Haining Wang and Jiaheng Wang and Zhi Ding}, title = {Distributed Power Control in a Two-Tier Heterogeneous Network}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {14}, number = {12}, pages = {6509--6523}, year = {2015}, url = {https://doi.org/10.1109/TWC.2015.2456055}, doi = {10.1109/TWC.2015.2456055}, timestamp = {Fri, 12 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/WangWD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LiuDGW15, author = {Dachuan Liu and Bo Dong and Xing Gao and Haining Wang}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Exploiting Eye Tracking for Smartphone Authentication}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {457--477}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_22}, doi = {10.1007/978-3-319-28166-7\_22}, timestamp = {Fri, 26 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/LiuDGW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangLWS15, author = {Fengwei Zhang and Kevin Leach and Haining Wang and Angelos Stavrou}, editor = {Feng Bao and Steven Miller and Jianying Zhou and Gail{-}Joon Ahn}, title = {TrustLogin: Securing Password-Login on Commodity Operating Systems}, booktitle = {Proceedings of the 10th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17, 2015}, pages = {333--344}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2714576.2714614}, doi = {10.1145/2714576.2714614}, timestamp = {Thu, 20 Oct 2022 10:45:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhangLWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/SunSWJW15, author = {He Sun and Kun Sun and Yuewu Wang and Jiwu Jing and Haining Wang}, title = {TrustICE: Hardware-Assisted Isolated Computing Environments on Mobile Devices}, booktitle = {45th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2015, Rio de Janeiro, Brazil, June 22-25, 2015}, pages = {367--378}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/DSN.2015.11}, doi = {10.1109/DSN.2015.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/SunSWJW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/HaoWSS15, author = {Shuai Hao and Haining Wang and Angelos Stavrou and Evgenia Smirni}, title = {On the {DNS} Deployment of Modern Web Services}, booktitle = {23rd {IEEE} International Conference on Network Protocols, {ICNP} 2015, San Francisco, CA, USA, November 10-13, 2015}, pages = {100--110}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICNP.2015.37}, doi = {10.1109/ICNP.2015.37}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/HaoWSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lisa/XiaoLHW15, author = {Jidong Xiao and Lei Lu and Hai Huang and Haining Wang}, title = {Hyperprobe: Towards Virtual Machine Extrospection}, booktitle = {29th Large Installation System Administration Conference, {LISA} 2015, Washington, D.C., USA, November 8-13, 2015}, pages = {1--12}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/lisa15/conference-program/presentation/xiao}, timestamp = {Tue, 02 Feb 2021 08:06:07 +0100}, biburl = {https://dblp.org/rec/conf/lisa/XiaoLHW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/XuWS15, author = {Haitao Xu and Haining Wang and Angelos Stavrou}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Privacy Risk Assessment on Online Photos}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {427--447}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_20}, doi = {10.1007/978-3-319-26362-5\_20}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/XuWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/XiaoHW15, author = {Jidong Xiao and Hai Huang and Haining Wang}, editor = {Bhavani Thuraisingham and XiaoFeng Wang and Vinod Yegneswaran}, title = {Defeating Kernel Driver Purifier}, booktitle = {Security and Privacy in Communication Networks - 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {164}, pages = {116--134}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28865-9\_7}, doi = {10.1007/978-3-319-28865-9\_7}, timestamp = {Wed, 29 Jun 2022 15:37:43 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/XiaoHW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/XiaoHW15a, author = {Jidong Xiao and Hai Huang and Haining Wang}, editor = {Bhavani Thuraisingham and XiaoFeng Wang and Vinod Yegneswaran}, title = {Kernel Data Attack Is a Realistic Security Threat}, booktitle = {Security and Privacy in Communication Networks - 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {164}, pages = {135--154}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28865-9\_8}, doi = {10.1007/978-3-319-28865-9\_8}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/XiaoHW15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ZhangLSWS15, author = {Fengwei Zhang and Kevin Leach and Angelos Stavrou and Haining Wang and Kun Sun}, title = {Using Hardware Features for Increased Debugging Transparency}, booktitle = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose, CA, USA, May 17-21, 2015}, pages = {55--69}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SP.2015.11}, doi = {10.1109/SP.2015.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ZhangLSWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/GaoLWS15, author = {Xing Gao and Dachuan Liu and Haining Wang and Kun Sun}, title = {PmDroid: Permission Supervision for Android Advertising}, booktitle = {34th {IEEE} Symposium on Reliable Distributed Systems, {SRDS} 2015, Montreal, QC, Canada, September 28 - October 1, 2015}, pages = {120--129}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SRDS.2015.41}, doi = {10.1109/SRDS.2015.41}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/srds/GaoLWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/XuWW15, author = {Zhang Xu and Haining Wang and Zhenyu Wu}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {A Measurement Study on Co-residence Threat inside the Cloud}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {929--944}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/xu}, timestamp = {Mon, 01 Feb 2021 08:42:57 +0100}, biburl = {https://dblp.org/rec/conf/uss/XuWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/XuLWS15, author = {Haitao Xu and Daiping Liu and Haining Wang and Angelos Stavrou}, editor = {Aldo Gangemi and Stefano Leonardi and Alessandro Panconesi}, title = {E-commerce Reputation Manipulation: The Emergence of Reputation-Escalation-as-a-Service}, booktitle = {Proceedings of the 24th International Conference on World Wide Web, {WWW} 2015, Florence, Italy, May 18-22, 2015}, pages = {1296--1306}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2736277.2741650}, doi = {10.1145/2736277.2741650}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/XuLWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/RenQZW14, author = {Zhen Ren and Xin Qi and Gang Zhou and Haining Wang}, title = {Exploiting the Data Sensitivity of Neurometric Fidelity for Optimizing {EEG} Sensing}, journal = {{IEEE} Internet Things J.}, volume = {1}, number = {3}, pages = {243--254}, year = {2014}, url = {https://doi.org/10.1109/JIOT.2014.2322331}, doi = {10.1109/JIOT.2014.2322331}, timestamp = {Mon, 05 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/RenQZW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/WangD14, author = {Haining Wang and Zhi Ding}, title = {Macrocell-Queue-Stabilization-Based Power Control of Femtocell Networks}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {13}, number = {9}, pages = {5223--5236}, year = {2014}, url = {https://doi.org/10.1109/TWC.2014.2329852}, doi = {10.1109/TWC.2014.2329852}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/WangD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/CooleyWS14, author = {Brett Cooley and Haining Wang and Angelos Stavrou}, editor = {Ioana Boureanu and Philippe Owesarski and Serge Vaudenay}, title = {Activity Spoofing and Its Defense in Android Smartphones}, booktitle = {Applied Cryptography and Network Security - 12th International Conference, {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8479}, pages = {494--512}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07536-5\_29}, doi = {10.1007/978-3-319-07536-5\_29}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/CooleyWS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsm/LeXHW14, author = {Duy Le and Jidong Xiao and Hai Huang and Haining Wang}, editor = {Danny Raz and Michele Nogueira and Edmundo Roberto Mauro Madeira and Brendan Jennings and Lisandro Zambenedetti Granville and Luciano Paschoal Gaspary}, title = {Shadow patching: Minimizing maintenance windows in a virtualized enterprise environment}, booktitle = {10th International Conference on Network and Service Management, {CNSM} 2014 and Workshop, Rio de Janeiro, Brazil, November 17-21, 2014}, pages = {169--174}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CNSM.2014.7014154}, doi = {10.1109/CNSM.2014.7014154}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnsm/LeXHW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/SengarWI14, author = {Hemant Sengar and Haining Wang and Seyed Amir Iranmanesh}, editor = {Elisa Bertino and Ravi S. Sandhu and Jaehong Park}, title = {Wiretap-proof: what they hear is not what you speak, and what you speak they do not hear}, booktitle = {Fourth {ACM} Conference on Data and Application Security and Privacy, CODASPY'14, San Antonio, TX, {USA} - March 03 - 05, 2014}, pages = {345--356}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2557547.2557567}, doi = {10.1145/2557547.2557567}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/SengarWI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/LiuWS14, author = {Daiping Liu and Haining Wang and Angelos Stavrou}, title = {Detecting Malicious Javascript in {PDF} through Document Instrumentation}, booktitle = {44th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2014, Atlanta, GA, USA, June 23-26, 2014}, pages = {100--111}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/DSN.2014.92}, doi = {10.1109/DSN.2014.92}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/LiuWS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ZhangWLS14, author = {Fengwei Zhang and Haining Wang and Kevin Leach and Angelos Stavrou}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {A Framework to Secure Peripherals at Runtime}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8712}, pages = {219--238}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11203-9\_13}, doi = {10.1007/978-3-319-11203-9\_13}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/ZhangWLS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/XuLKWS14, author = {Haitao Xu and Daiping Liu and Aaron Koehl and Haining Wang and Angelos Stavrou}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {Click Fraud Detection on the Advertiser Side}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {419--438}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_24}, doi = {10.1007/978-3-319-11212-1\_24}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/XuLKWS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/WangD14, author = {Haining Wang and Zhi Ding}, title = {Power control and rate allocation for outage balancing in femtocell networks}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2014, Austin, TX, USA, December 8-12, 2014}, pages = {4257--4262}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/GLOCOM.2014.7037476}, doi = {10.1109/GLOCOM.2014.7037476}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/WangD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/ZhengBHW14, author = {Nan Zheng and Kun Bai and Hai Huang and Haining Wang}, title = {You Are How You Touch: User Verification on Smartphones via Tapping Behaviors}, booktitle = {22nd {IEEE} International Conference on Network Protocols, {ICNP} 2014, Raleigh, NC, USA, October 21-24, 2014}, pages = {221--232}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ICNP.2014.43}, doi = {10.1109/ICNP.2014.43}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/ZhengBHW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ZhangRWW14, author = {Yubao Zhang and Xin Ruan and Haining Wang and Hui Wang}, title = {What scale of audience a campaign can reach in what price on Twitter?}, booktitle = {2014 {IEEE} Conference on Computer Communications, {INFOCOM} 2014, Toronto, Canada, April 27 - May 2, 2014}, pages = {1168--1176}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/INFOCOM.2014.6848048}, doi = {10.1109/INFOCOM.2014.6848048}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/ZhangRWW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/JiangWDF14, author = {Yi Jiang and Haining Wang and Babak Daneshrad and Bruce Fette}, title = {{PHY} and {MAC} Design for Distributed Tx-Rx beamforming in Mobile Ad Hoc Networks}, booktitle = {2014 {IEEE} Military Communications Conference, {MILCOM} 2014, Baltimore, MD, USA, October 6-8, 2014}, pages = {885--890}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/MILCOM.2014.152}, doi = {10.1109/MILCOM.2014.152}, timestamp = {Fri, 16 Sep 2022 20:28:33 +0200}, biburl = {https://dblp.org/rec/conf/milcom/JiangWDF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/WangJDF14, author = {Haining Wang and Yi Jiang and Babak Daneshrad and Bruce Fette}, title = {Improving Spectral Efficiency of {MIMO} Ad Hoc Network via Greedy {MCS} Packing}, booktitle = {2014 {IEEE} Military Communications Conference, {MILCOM} 2014, Baltimore, MD, USA, October 6-8, 2014}, pages = {904--909}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/MILCOM.2014.155}, doi = {10.1109/MILCOM.2014.155}, timestamp = {Fri, 16 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/milcom/WangJDF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/XuWXW14, author = {Zhang Xu and Haining Wang and Zichen Xu and Xiaorui Wang}, title = {Power Attack: An Increasing Threat to Data Centers}, booktitle = {21st Annual Network and Distributed System Security Symposium, {NDSS} 2014, San Diego, California, USA, February 23-26, 2014}, publisher = {The Internet Society}, year = {2014}, url = {https://www.ndss-symposium.org/ndss2014/power-attack-increasing-threat-data-centers}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/XuWXW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/BalenW14, author = {Nicolas Van Balen and Haining Wang}, editor = {Jing Tian and Jiwu Jing and Mudhakar Srivatsa}, title = {GridMap: Enhanced Security in Cued-Recall Graphical Passwords}, booktitle = {International Conference on Security and Privacy in Communication Networks - 10th International {ICST} Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {152}, pages = {75--94}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-23829-6\_6}, doi = {10.1007/978-3-319-23829-6\_6}, timestamp = {Tue, 23 May 2017 01:12:12 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/BalenW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/XuWJ14, author = {Zhang Xu and Haining Wang and Sushil Jajodia}, title = {Gemini: An Emergency Line of Defense against Phishing Attacks}, booktitle = {33rd {IEEE} International Symposium on Reliable Distributed Systems, {SRDS} 2014, Nara, Japan, October 6-9, 2014}, pages = {11--20}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SRDS.2014.26}, doi = {10.1109/SRDS.2014.26}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/srds/XuWJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ChuGKWJ13, author = {Zi Chu and Steven Gianvecchio and Aaron Koehl and Haining Wang and Sushil Jajodia}, title = {Blog or block: Detecting blog bots through behavioral biometrics}, journal = {Comput. Networks}, volume = {57}, number = {3}, pages = {634--646}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.10.005}, doi = {10.1016/J.COMNET.2012.10.005}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/ChuGKWJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/WuZSJW13, author = {Zhenyu Wu and Yueping Zhang and Vishal K. Singh and Guofei Jiang and Haining Wang}, title = {Automating Cloud Network Optimization and Evolution}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {31}, number = {12}, pages = {2620--2631}, year = {2013}, url = {https://doi.org/10.1109/JSAC.2013.131204}, doi = {10.1109/JSAC.2013.131204}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/WuZSJW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/CiernyWWDW13, author = {Michal Cierny and Haining Wang and Risto Wichman and Zhi Ding and Carl Wijting}, title = {On Number of Almost Blank Subframes in Heterogeneous Cellular Networks}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {12}, number = {10}, pages = {5061--5073}, year = {2013}, url = {https://doi.org/10.1109/TWC.2013.090513.121756}, doi = {10.1109/TWC.2013.090513.121756}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/CiernyWWDW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tweb/YueW13, author = {Chuan Yue and Haining Wang}, title = {A measurement study of insecure javascript practices on the web}, journal = {{ACM} Trans. Web}, volume = {7}, number = {2}, pages = {7:1--7:39}, year = {2013}, url = {https://doi.org/10.1145/2460383.2460386}, doi = {10.1145/2460383.2460386}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tweb/YueW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/JinOZMKW13, author = {Jing Jin and Jeff Offutt and Nan Zheng and Feng Mao and Aaron Koehl and Haining Wang}, title = {Evasive bots masquerading as human beings on the web}, booktitle = {2013 43rd Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks (DSN), Budapest, Hungary, June 24-27, 2013}, pages = {1--12}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/DSN.2013.6575366}, doi = {10.1109/DSN.2013.6575366}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/JinOZMKW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/XiaoXHW13, author = {Jidong Xiao and Zhang Xu and Hai Huang and Haining Wang}, title = {Security implications of memory deduplication in a virtualized environment}, booktitle = {2013 43rd Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks (DSN), Budapest, Hungary, June 24-27, 2013}, pages = {1--12}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/DSN.2013.6575349}, doi = {10.1109/DSN.2013.6575349}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/XiaoXHW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/WangDCW13, author = {Haining Wang and Zhi Ding and Michal Cierny and Risto Wichman}, title = {Time domain bi-level downlink power control for cross-tier interference mitigation in HetNet}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2013, Budapest, Hungary, June 9-13, 2013}, pages = {5183--5187}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICC.2013.6655407}, doi = {10.1109/ICC.2013.6655407}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/WangDCW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/RuanYW13, author = {Xin Ruan and Chuan Yue and Haining Wang}, editor = {Tanveer A. Zia and Albert Y. Zomaya and Vijay Varadharajan and Zhuoqing Morley Mao}, title = {Unveiling Privacy Setting Breaches in Online Social Networks}, booktitle = {Security and Privacy in Communication Networks - 9th International {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {127}, pages = {323--341}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04283-1\_20}, doi = {10.1007/978-3-319-04283-1\_20}, timestamp = {Mon, 05 Jun 2017 12:43:35 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/RuanYW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/WangWDC13, author = {Kun{-}Yu Wang and Haining Wang and Zhi Ding and Chong{-}Yung Chi}, title = {A Low-Complexity Algorithm for Worst-Case Utility Maximization in Multiuser {MISO} Downlink}, booktitle = {Proceedings of the 78th {IEEE} Vehicular Technology Conference, {VTC} Fall 2013, Las Vegas, NV, USA, September 2-5, 2013}, pages = {1--5}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/VTCFall.2013.6692040}, doi = {10.1109/VTCFALL.2013.6692040}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/vtc/WangWDC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1302-5975, author = {Kun{-}Yu Wang and Haining Wang and Zhi Ding and Chong{-}Yung Chi}, title = {Low-Complexity Algorithm for Worst-Case Utility Maximization in Multiuser {MISO} Downlink}, journal = {CoRR}, volume = {abs/1302.5975}, year = {2013}, url = {http://arxiv.org/abs/1302.5975}, eprinttype = {arXiv}, eprint = {1302.5975}, timestamp = {Tue, 25 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1302-5975.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1304-2269, author = {Michal Cierny and Haining Wang and Risto Wichman and Zhi Ding and Carl Wijting}, title = {On Number of Almost Blank Subframes in Heterogeneous Cellular Networks}, journal = {CoRR}, volume = {abs/1304.2269}, year = {2013}, url = {http://arxiv.org/abs/1304.2269}, eprinttype = {arXiv}, eprint = {1304.2269}, timestamp = {Fri, 14 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1304-2269.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/XieWW12, author = {Mengjun Xie and Zhenyu Wu and Haining Wang}, title = {Secure instant messaging in enterprise-like networks}, journal = {Comput. Networks}, volume = {56}, number = {1}, pages = {448--461}, year = {2012}, url = {https://doi.org/10.1016/j.comnet.2011.09.006}, doi = {10.1016/J.COMNET.2011.09.006}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/XieWW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChuGWJ12, author = {Zi Chu and Steven Gianvecchio and Haining Wang and Sushil Jajodia}, title = {Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg?}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {6}, pages = {811--824}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.75}, doi = {10.1109/TDSC.2012.75}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChuGWJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WuXW12, author = {Zhenyu Wu and Mengjun Xie and Haining Wang}, title = {On Energy Security of Server Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {6}, pages = {865--876}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.70}, doi = {10.1109/TDSC.2012.70}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WuXW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/SangZLWXWZJ12, author = {Bo Sang and Jianfeng Zhan and Gang Lu and Haining Wang and Dongyan Xu and Lei Wang and Zhihong Zhang and Zhen Jia}, title = {Precise, Scalable, and Online Request Tracing for Multitier Services of Black Boxes}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {23}, number = {6}, pages = {1159--1167}, year = {2012}, url = {https://doi.org/10.1109/TPDS.2011.257}, doi = {10.1109/TPDS.2011.257}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/SangZLWXWZJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ChuWW12, author = {Zi Chu and Indra Widjaja and Haining Wang}, editor = {Feng Bao and Pierangela Samarati and Jianying Zhou}, title = {Detecting Social Spam Campaigns on Twitter}, booktitle = {Applied Cryptography and Network Security - 10th International Conference, {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7341}, pages = {455--472}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31284-7\_27}, doi = {10.1007/978-3-642-31284-7\_27}, timestamp = {Fri, 09 Apr 2021 18:46:11 +0200}, biburl = {https://dblp.org/rec/conf/acns/ChuWW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XiaoXHW12, author = {Jidong Xiao and Zhang Xu and Hai Huang and Haining Wang}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {A covert channel construction in a virtualized environment}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {1040--1042}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382318}, doi = {10.1145/2382196.2382318}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/XiaoXHW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fast/LeHW12, author = {Duy Le and Hai Huang and Haining Wang}, editor = {William J. Bolosky and Jason Flinn}, title = {Understanding performance implications of nested file systems in a virtualized environment}, booktitle = {Proceedings of the 10th {USENIX} conference on File and Storage Technologies, {FAST} 2012, San Jose, CA, USA, February 14-17, 2012}, pages = {8}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/fast12/understanding-performance-implications-nested-file-systems-virtualized-environment}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fast/LeHW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icac/LuZWYW12, author = {Gang Lu and Jianfeng Zhan and Haining Wang and Lin Yuan and Chuliang Weng}, editor = {Dejan S. Milojicic and Dongyan Xu and Vanish Talwar}, title = {PowerTracer: tracing requests in multi-tier services to diagnose energy inefficiency}, booktitle = {9th International Conference on Autonomic Computing, ICAC'12, San Jose, CA, USA, September 16 - 20, 2012}, pages = {97--102}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2371536.2371553}, doi = {10.1145/2371536.2371553}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icac/LuZWYW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/XieWW12, author = {Mengjun Xie and Indra Widjaja and Haining Wang}, editor = {Albert G. Greenberg and Kazem Sohraby}, title = {Enhancing cache robustness for content-centric networking}, booktitle = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March 25-30, 2012}, pages = {2426--2434}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/INFCOM.2012.6195632}, doi = {10.1109/INFCOM.2012.6195632}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/XieWW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/WuZSJW12, author = {Zhenyu Wu and Yueping Zhang and Vishal K. Singh and Guofei Jiang and Haining Wang}, title = {NetDEO: Automating network design, evolution, and optimization}, booktitle = {20th {IEEE} International Workshop on Quality of Service, IWQoS 2012, Coimbra, Portugal, June 4-5, 2012}, pages = {1--9}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/IWQoS.2012.6245996}, doi = {10.1109/IWQOS.2012.6245996}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/iwqos/WuZSJW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/middleware/KoehlW12, author = {Aaron Koehl and Haining Wang}, editor = {Priya Narasimhan and Peter Triantafillou}, title = {m.Site: Efficient Content Adaptation for Mobile Devices}, booktitle = {Middleware 2012 - {ACM/IFIP/USENIX} 13th International Middleware Conference, Montreal, QC, Canada, December 3-7, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7662}, pages = {41--60}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35170-9\_3}, doi = {10.1007/978-3-642-35170-9\_3}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/middleware/KoehlW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/IranmaneshSW12, author = {Seyed Amir Iranmanesh and Hemant Sengar and Haining Wang}, editor = {Angelos D. Keromytis and Roberto Di Pietro}, title = {A Voice Spam Filter to Clean Subscribers' Mailbox}, booktitle = {Security and Privacy in Communication Networks - 8th International {ICST} Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {106}, pages = {349--367}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-36883-7\_21}, doi = {10.1007/978-3-642-36883-7\_21}, timestamp = {Tue, 23 May 2017 01:12:12 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/IranmaneshSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WuXW12, author = {Zhenyu Wu and Zhang Xu and Haining Wang}, editor = {Tadayoshi Kohno}, title = {Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud}, booktitle = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA, USA, August 8-10, 2012}, pages = {159--173}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/wu}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/WuXW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/KoehlW12, author = {Aaron Koehl and Haining Wang}, editor = {Alain Mille and Fabien Gandon and Jacques Misselis and Michael Rabinovich and Steffen Staab}, title = {Surviving a search engine overload}, booktitle = {Proceedings of the 21st World Wide Web Conference 2012, {WWW} 2012, Lyon, France, April 16-20, 2012}, pages = {171--180}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2187836.2187860}, doi = {10.1145/2187836.2187860}, timestamp = {Fri, 16 Apr 2021 10:04:12 +0200}, biburl = {https://dblp.org/rec/conf/www/KoehlW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/securecomm/2011, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31909-9}, doi = {10.1007/978-3-642-31909-9}, isbn = {978-3-642-31908-2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ChuW11, author = {Zi Chu and Haining Wang}, title = {An investigation of hotlinking and its countermeasures}, journal = {Comput. Commun.}, volume = {34}, number = {4}, pages = {577--590}, year = {2011}, url = {https://doi.org/10.1016/j.comcom.2010.05.007}, doi = {10.1016/J.COMCOM.2010.05.007}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/ChuW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/XiangLWZ11, author = {Yang Xiang and Javier L{\'{o}}pez and Haining Wang and Wanlei Zhou}, title = {Special Issue: Securing Distributed Networks and Systems}, journal = {Concurr. Comput. Pract. Exp.}, volume = {23}, number = {12}, pages = {1311--1312}, year = {2011}, url = {https://doi.org/10.1002/cpe.1703}, doi = {10.1002/CPE.1703}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/XiangLWZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GianvecchioW11, author = {Steven Gianvecchio and Haining Wang}, title = {An Entropy-Based Approach to Detecting Covert Timing Channels}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {8}, number = {6}, pages = {785--797}, year = {2011}, url = {https://doi.org/10.1109/TDSC.2010.46}, doi = {10.1109/TDSC.2010.46}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GianvecchioW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/WuXW11, author = {Zhenyu Wu and Mengjun Xie and Haining Wang}, title = {Design and Implementation of a Fast Dynamic Packet Filter}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {19}, number = {5}, pages = {1405--1419}, year = {2011}, url = {https://doi.org/10.1109/TNET.2011.2111381}, doi = {10.1109/TNET.2011.2111381}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/WuXW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/GianvecchioXWW11, author = {Steven Gianvecchio and Mengjun Xie and Zhenyu Wu and Haining Wang}, title = {Humans and Bots in Internet Chat: Measurement, Analysis, and Automated Classification}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {19}, number = {5}, pages = {1557--1571}, year = {2011}, url = {https://doi.org/10.1109/TNET.2011.2126591}, doi = {10.1109/TNET.2011.2126591}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/GianvecchioXWW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/LeW11, author = {Duy Le and Haining Wang}, title = {An Effective Memory Optimization for Virtual Machine-Based Systems}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {22}, number = {10}, pages = {1705--1713}, year = {2011}, url = {https://doi.org/10.1109/TPDS.2011.37}, doi = {10.1109/TPDS.2011.37}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/LeW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhengPW11, author = {Nan Zheng and Aaron Paloski and Haining Wang}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {An efficient user verification system via mouse movements}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {139--150}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046707.2046725}, doi = {10.1145/2046707.2046725}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhengPW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/RenZPKMW11, author = {Zhen Ren and Gang Zhou and Andrew J. Pyles and Matthew Keally and Weizhen Mao and Haining Wang}, title = {BodyT2: Throughput and time delay performance assurance for heterogeneous BSNs}, booktitle = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 10-15 April 2011, Shanghai, China}, pages = {2750--2758}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/INFCOM.2011.5935107}, doi = {10.1109/INFCOM.2011.5935107}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/RenZPKMW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WuXW11a, author = {Zhenyu Wu and Mengjun Xie and Haining Wang}, editor = {David Brumley and Michal Zalewski}, title = {Energy Attack on Server Systems}, booktitle = {5th {USENIX} Workshop on Offensive Technologies, WOOT'11, August 8, 2011, San Francisco, CA, USA, Proceedings}, pages = {62--70}, publisher = {{USENIX} Association}, year = {2011}, url = {http://static.usenix.org/event/woot11/tech/final\_files/Wu.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/WuXW11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/YueXW10, author = {Chuan Yue and Mengjun Xie and Haining Wang}, title = {An automatic {HTTP} cookie management system}, journal = {Comput. Networks}, volume = {54}, number = {13}, pages = {2182--2198}, year = {2010}, url = {https://doi.org/10.1016/j.comnet.2010.03.006}, doi = {10.1016/J.COMNET.2010.03.006}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/YueXW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/YinSWP10, author = {Heng Yin and Bo Sheng and Haining Wang and Jianping Pan}, title = {Keychain-Based Signatures for Securing {BGP}}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {28}, number = {8}, pages = {1308--1318}, year = {2010}, url = {https://doi.org/10.1109/JSAC.2010.101008}, doi = {10.1109/JSAC.2010.101008}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsac/YinSWP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/XiangZW10, author = {Yang Xiang and Wanlei Zhou and Haining Wang}, title = {Security in next generation wireless networks}, journal = {Secur. Commun. Networks}, volume = {3}, number = {1}, pages = {1--3}, year = {2010}, url = {https://doi.org/10.1002/sec.151}, doi = {10.1002/SEC.151}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/XiangZW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/YueW10, author = {Chuan Yue and Haining Wang}, title = {BogusBiter: {A} transparent protection against phishing attacks}, journal = {{ACM} Trans. Internet Techn.}, volume = {10}, number = {2}, pages = {6:1--6:31}, year = {2010}, url = {https://doi.org/10.1145/1754393.1754395}, doi = {10.1145/1754393.1754395}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toit/YueW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ChuGWJ10, author = {Zi Chu and Steven Gianvecchio and Haining Wang and Sushil Jajodia}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Who is tweeting on Twitter: human, bot, or cyborg?}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {21--30}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920265}, doi = {10.1145/1920261.1920265}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ChuGWJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WuGXW10, author = {Zhenyu Wu and Steven Gianvecchio and Mengjun Xie and Haining Wang}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {Mimimorphism: a new approach to binary code obfuscation}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {536--546}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866368}, doi = {10.1145/1866307.1866368}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/WuGXW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/SengarRWWJ10, author = {Hemant Sengar and Zhen Ren and Haining Wang and Duminda Wijesekera and Sushil Jajodia}, title = {Tracking Skype VoIP Calls Over The Internet}, booktitle = {{INFOCOM} 2010. 29th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 15-19 March 2010, San Diego, CA, {USA}}, pages = {96--100}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/INFCOM.2010.5462266}, doi = {10.1109/INFCOM.2010.5462266}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/SengarRWWJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/XieW10, author = {Mengjun Xie and Haining Wang}, title = {A Collaboration-based Autonomous Reputation System for Email Services}, booktitle = {{INFOCOM} 2010. 29th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 15-19 March 2010, San Diego, CA, {USA}}, pages = {992--1000}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/INFCOM.2010.5461948}, doi = {10.1109/INFCOM.2010.5461948}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/XieW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/LeW10, author = {Duy Le and Haining Wang}, title = {An effective feedback-driven approach for energy saving in battery powered systems}, booktitle = {18th International Workshop on Quality of Service, IWQoS 2010, Beijing, China, 16-18 June 2010}, pages = {1--9}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/IWQoS.2010.5542738}, doi = {10.1109/IWQOS.2010.5542738}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/iwqos/LeW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1007-4890, author = {Lin Yuan and Jianfeng Zhan and Bo Sang and Lei Wang and Haining Wang}, title = {PowerTracer: Tracing requests in multi-tier services to save cluster power consumption}, journal = {CoRR}, volume = {abs/1007.4890}, year = {2010}, url = {http://arxiv.org/abs/1007.4890}, eprinttype = {arXiv}, eprint = {1007.4890}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1007-4890.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/YueW09, author = {Chuan Yue and Haining Wang}, title = {Profit-aware overload protection in E-commerce Web sites}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {2}, pages = {347--356}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.02.020}, doi = {10.1016/J.JNCA.2008.02.020}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/YueW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GianvecchioWXW09, author = {Steven Gianvecchio and Zhenyu Wu and Mengjun Xie and Haining Wang}, editor = {Ehab Al{-}Shaer and Somesh Jha and Angelos D. Keromytis}, title = {Battle of Botcraft: fighting bots in online games with human observational proofs}, booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009}, pages = {256--268}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1653662.1653694}, doi = {10.1145/1653662.1653694}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GianvecchioWXW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/CourtwrightYW09, author = {Eli Courtwright and Chuan Yue and Haining Wang}, title = {Efficient resource management on template-based web servers}, booktitle = {Proceedings of the 2009 {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2009, Estoril, Lisbon, Portugal, June 29 - July 2, 2009}, pages = {249--258}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/DSN.2009.5270329}, doi = {10.1109/DSN.2009.5270329}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/CourtwrightYW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/huc/YueW09, author = {Chuan Yue and Haining Wang}, editor = {Sumi Helal and Hans Gellersen and Sunny Consolvo}, title = {SessionMagnifier: a simple approach to secure and convenient kiosk browsing}, booktitle = {UbiComp 2009: Ubiquitous Computing, 11th International Conference, UbiComp 2009, Orlando, Florida, USA, September 30 - October 3, 2009, Proceedings}, series = {{ACM} International Conference Proceeding Series}, pages = {125--134}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1620545.1620566}, doi = {10.1145/1620545.1620566}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/huc/YueW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/SengarWWWJ09, author = {Hemant Sengar and Xinyuan Wang and Haining Wang and Duminda Wijesekera and Sushil Jajodia}, title = {Online detection of network traffic anomalies using behavioral distance}, booktitle = {17th International Workshop on Quality of Service, IWQoS 2009, Charleston, South Carolina, USA, 13-15 July 2009}, pages = {1--9}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/IWQoS.2009.5201415}, doi = {10.1109/IWQOS.2009.5201415}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwqos/SengarWWWJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lisa/StrahsYW09, author = {Benjamin Strahs and Chuan Yue and Haining Wang}, editor = {Adam Moskowitz}, title = {Secure Passwords Through Enhanced Hashing}, booktitle = {Proceedings of the 23rd Large Installation System Administration Conference, November 1-6, 2009, Baltimore, MD, {USA}}, pages = {93--106}, publisher = {{USENIX} Association}, year = {2009}, url = {http://www.usenix.org/events/lisa09/tech/full\_papers/strahs.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lisa/StrahsYW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/YueCW09, author = {Chuan Yue and Zi Chu and Haining Wang}, editor = {Geoffrey M. Voelker and Alec Wolman}, title = {{RCB:} {A} Simple and Practical Framework for Real-time Collaborative Browsing}, booktitle = {2009 {USENIX} Annual Technical Conference, San Diego, CA, USA, June 14-19, 2009}, publisher = {{USENIX} Association}, year = {2009}, url = {https://www.usenix.org/conference/usenix-09/rcb-simple-and-practical-framework-real-time-collaborative-browsing}, timestamp = {Mon, 01 Feb 2021 08:43:29 +0100}, biburl = {https://dblp.org/rec/conf/usenix/YueCW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/YueW09, author = {Chuan Yue and Haining Wang}, editor = {Juan Quemada and Gonzalo Le{\'{o}}n and Yo{\"{e}}lle S. Maarek and Wolfgang Nejdl}, title = {Characterizing insecure javascript practices on the web}, booktitle = {Proceedings of the 18th International Conference on World Wide Web, {WWW} 2009, Madrid, Spain, April 20-24, 2009}, pages = {961--970}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1526709.1526838}, doi = {10.1145/1526709.1526838}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/YueW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nss/2009, editor = {Yang Xiang and Javier L{\'{o}}pez and Haining Wang and Wanlei Zhou}, title = {Third International Conference on Network and System Security, {NSS} 2009, Gold Coast, Queensland, Australia, October 19-21, 2009}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://ieeexplore.ieee.org/xpl/conhome/5328291/proceeding}, isbn = {978-0-7695-3838-9}, timestamp = {Fri, 22 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/XieYW08, author = {Mengjun Xie and Heng Yin and Haining Wang}, title = {Thwarting E-mail Spam Laundering}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {2}, pages = {13:1--13:32}, year = {2008}, url = {https://doi.org/10.1145/1455518.1455525}, doi = {10.1145/1455518.1455525}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/XieYW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/SengarWWJ08, author = {Hemant Sengar and Haining Wang and Duminda Wijesekera and Sushil Jajodia}, title = {Detecting VoIP Floods Using the Hellinger Distance}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {19}, number = {6}, pages = {794--805}, year = {2008}, url = {https://doi.org/10.1109/TPDS.2007.70786}, doi = {10.1109/TPDS.2007.70786}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/SengarWWJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/YueW08, author = {Chuan Yue and Haining Wang}, title = {Anti-Phishing in Offense and Defense}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {345--354}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.32}, doi = {10.1109/ACSAC.2008.32}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/YueW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csse/HainingHM08, author = {Haining Wang and Huifeng Xue and Mengmeng Ge}, title = {Application and Practice of System Integration Approach in Intelligent Human Motion Recognition}, booktitle = {International Conference on Computer Science and Software Engineering, {CSSE} 2008, Volume 1: Artificial Intelligence, December 12-14, 2008, Wuhan, China}, pages = {156--159}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CSSE.2008.642}, doi = {10.1109/CSSE.2008.642}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csse/HainingHM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsdi/WuXW08, author = {Zhenyu Wu and Mengjun Xie and Haining Wang}, editor = {Jon Crowcroft and Michael Dahlin}, title = {Swift: {A} Fast Dynamic Packet Filter}, booktitle = {5th {USENIX} Symposium on Networked Systems Design {\&} Implementation, {NSDI} 2008, April 16-18, 2008, San Francisco, CA, USA, Proceedings}, pages = {279--292}, publisher = {{USENIX} Association}, year = {2008}, url = {http://www.usenix.org/events/nsdi08/tech/full\_papers/wu/wu.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nsdi/WuXW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GianvecchioWWJ08, author = {Steven Gianvecchio and Haining Wang and Duminda Wijesekera and Sushil Jajodia}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {Model-Based Covert Timing Channels: Automated Modeling and Evasion}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {211--230}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_12}, doi = {10.1007/978-3-540-87403-4\_12}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/GianvecchioWWJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GianvecchioXWW08, author = {Steven Gianvecchio and Mengjun Xie and Zhengyu Wu and Haining Wang}, editor = {Paul C. van Oorschot}, title = {Measurement and Classification of Humans and Bots in Internet Chat}, booktitle = {Proceedings of the 17th {USENIX} Security Symposium, July 28-August 1, 2008, San Jose, CA, {USA}}, pages = {155--170}, publisher = {{USENIX} Association}, year = {2008}, url = {http://www.usenix.org/events/sec08/tech/full\_papers/gianvecchio/gianvecchio.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/GianvecchioXWW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/GuoDWLCZ07, author = {Lei Guo and Xiaoning Ding and Haining Wang and Qun Li and Songqing Chen and Xiaodong Zhang}, title = {Cooperative Relay Service in a Wireless {LAN}}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {25}, number = {2}, pages = {355--368}, year = {2007}, url = {https://doi.org/10.1109/JSAC.2007.070211}, doi = {10.1109/JSAC.2007.070211}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/GuoDWLCZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/ChenWRZ07, author = {Xin Chen and Haining Wang and Shansi Ren and Xiaodong Zhang}, title = {Maintaining Strong Cache Consistency for the Domain Name System}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {19}, number = {8}, pages = {1057--1071}, year = {2007}, url = {https://doi.org/10.1109/TKDE.2007.1049}, doi = {10.1109/TKDE.2007.1049}, timestamp = {Wed, 16 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/ChenWRZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/WangJS07, author = {Haining Wang and Cheng Jin and Kang G. Shin}, title = {Defense against spoofed {IP} traffic using hop-count filtering}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {15}, number = {1}, pages = {40--53}, year = {2007}, url = {http://doi.acm.org/10.1145/1241832.1241836}, doi = {10.1145/1241832.1241836}, timestamp = {Tue, 23 Oct 2007 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/WangJS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/YinW07, author = {Heng Yin and Haining Wang}, title = {Building an application-aware IPsec policy system}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {15}, number = {6}, pages = {1502--1513}, year = {2007}, url = {http://doi.acm.org/10.1145/1373476.1373499}, doi = {10.1145/1373476.1373499}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ton/YinW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/RenLWCZ07, author = {Shansi Ren and Qun Li and Haining Wang and Xin Chen and Xiaodong Zhang}, title = {Design and Analysis of Sensing Scheduling Algorithms under Partial Coverage for Object Detection in Sensor Networks}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {18}, number = {3}, pages = {334--350}, year = {2007}, url = {https://doi.org/10.1109/TPDS.2007.41}, doi = {10.1109/TPDS.2007.41}, timestamp = {Fri, 22 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/RenLWCZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/XieWW07, author = {Mengjun Xie and Zhenyu Wu and Haining Wang}, title = {HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {64--73}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.24}, doi = {10.1109/ACSAC.2007.24}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/XieWW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GianvecchioW07, author = {Steven Gianvecchio and Haining Wang}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Detecting covert timing channels: an entropy-based approach}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {307--316}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315284}, doi = {10.1145/1315245.1315284}, timestamp = {Tue, 10 Nov 2020 20:00:14 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GianvecchioW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/YueXW07, author = {Chuan Yue and Mengjun Xie and Haining Wang}, title = {Automatic Cookie Usage Setting with CookiePicker}, booktitle = {The 37th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2007, 25-28 June 2007, Edinburgh, UK, Proceedings}, pages = {460--470}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/DSN.2007.21}, doi = {10.1109/DSN.2007.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/YueXW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/YinSWP07, author = {Heng Yin and Bo Sheng and Haining Wang and Jianping Pan}, title = {Securing {BGP} through Keychain-based Signatures}, booktitle = {Fifteenth {IEEE} International Workshop on Quality of Service, IWQoS 2007, Evanston, Illinois, USA, June 21-22, 2007}, pages = {154--163}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/IWQOS.2007.376562}, doi = {10.1109/IWQOS.2007.376562}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwqos/YinSWP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/YueW07, author = {Chuan Yue and Haining Wang}, title = {Profit-aware Admission Control for Overload Protection in E-commerce Web Sites}, booktitle = {Fifteenth {IEEE} International Workshop on Quality of Service, IWQoS 2007, Evanston, Illinois, USA, June 21-22, 2007}, pages = {188--193}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/IWQOS.2007.376566}, doi = {10.1109/IWQOS.2007.376566}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwqos/YueW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/broadnets/ChaffeeWW06, author = {Wyatt Chaffee and Bin Wang and Haining Wang}, title = {Modeling and Analysis of a Shared Channel Architecture for Performance Improvement in Optical Burst Switched Networks}, booktitle = {3rd International Conference on Broadband Communications, Networks, and Systems {(BROADNETS} 2006), 1-5 October 2006, San Jos{\'{e}}, California, {USA}}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/BROADNETS.2006.4374323}, doi = {10.1109/BROADNETS.2006.4374323}, timestamp = {Wed, 19 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/broadnets/ChaffeeWW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XieYW06, author = {Mengjun Xie and Heng Yin and Haining Wang}, editor = {Ari Juels and Rebecca N. Wright and Sabrina De Capitani di Vimercati}, title = {An effective defense against email spam laundering}, booktitle = {Proceedings of the 13th {ACM} Conference on Computer and Communications Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3, 2006}, pages = {179--190}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1180405.1180428}, doi = {10.1145/1180405.1180428}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XieYW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/SengarWWJ06, author = {Hemant Sengar and Duminda Wijesekera and Haining Wang and Sushil Jajodia}, title = {VoIP Intrusion Detection Through Interacting Protocol State Machines}, booktitle = {2006 International Conference on Dependable Systems and Networks {(DSN} 2006), 25-28 June 2006, Philadelphia, Pennsylvania, USA, Proceedings}, pages = {393--402}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/DSN.2006.73}, doi = {10.1109/DSN.2006.73}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/SengarWWJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/ChenWR06, author = {Xin Chen and Haining Wang and Shansi Ren}, title = {DNScup: Strong Cache Consistency Protocol for {DNS}}, booktitle = {26th {IEEE} International Conference on Distributed Computing Systems {(ICDCS} 2006), 4-7 July 2006, Lisboa, Portugal}, pages = {40}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ICDCS.2006.31}, doi = {10.1109/ICDCS.2006.31}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/ChenWR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/GuoDWLCZ06, author = {Lei Guo and Xiaoning Ding and Haining Wang and Qun Li and Songqing Chen and Xiaodong Zhang}, title = {Exploiting Idle Communication Power to Improve Wireless Network Performance and Energy Efficiency}, booktitle = {{INFOCOM} 2006. 25th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 23-29 April 2006, Barcelona, Catalunya, Spain}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/INFOCOM.2006.274}, doi = {10.1109/INFOCOM.2006.274}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/GuoDWLCZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/SengarWWJ06, author = {Hemant Sengar and Haining Wang and Duminda Wijesekera and Sushil Jajodia}, title = {Fast Detection of Denial-of-Service Attacks on {IP} Telephony}, booktitle = {Quality of Service - IWQoS 2006: 14th International Workshop, IWQoS 2006, New Haven, CT, USA, 19-21 June 2006, Proceedings}, pages = {199--208}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/IWQOS.2006.250469}, doi = {10.1109/IWQOS.2006.250469}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/iwqos/SengarWWJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qest/XieTW06, author = {Mengjun Xie and Keywan Tabatabai and Haining Wang}, title = {Identifying Low-ProfileWeb Server's {IP} Fingerprint}, booktitle = {Third International Conference on the Quantitative Evaluation of Systems {(QEST} 2006), 11-14 September 2006, Riverside, California, {USA}}, pages = {365--374}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/QEST.2006.20}, doi = {10.1109/QEST.2006.20}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/qest/XieTW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeemm/ChenWZSW05, author = {Songqing Chen and Haining Wang and Xiaodong Zhang and Bo Shen and Susie J. Wee}, title = {Segment-Based Proxy Caching for Internet Streaming Media Delivery}, journal = {{IEEE} Multim.}, volume = {12}, number = {3}, pages = {59--67}, year = {2005}, url = {https://doi.org/10.1109/MMUL.2005.56}, doi = {10.1109/MMUL.2005.56}, timestamp = {Wed, 29 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeemm/ChenWZSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigmobile/RenLWCZ05, author = {Shansi Ren and Qun Li and Haining Wang and Xin Chen and Xiaodong Zhang}, title = {A study on object tracking quality under probabilistic coverage in sensor networks}, journal = {{ACM} {SIGMOBILE} Mob. Comput. Commun. Rev.}, volume = {9}, number = {1}, pages = {73--76}, year = {2005}, url = {https://doi.org/10.1145/1055959.1055971}, doi = {10.1145/1055959.1055971}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigmobile/RenLWCZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/WangBES05, author = {Haining Wang and Abhijit Bose and Mohamed A. El{-}Gendy and Kang G. Shin}, title = {{IP} Easy-pass: a light-weight network-edge resource access control}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {13}, number = {6}, pages = {1247--1260}, year = {2005}, url = {https://doi.org/10.1109/TNET.2005.860113}, doi = {10.1109/TNET.2005.860113}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/WangBES05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dcoss/RenLWZ05, author = {Shansi Ren and Qun Li and Haining Wang and Xiaodong Zhang}, editor = {Viktor K. Prasanna and S. Sitharama Iyengar and Paul G. Spirakis and Matt Welsh}, title = {Design and Analysis of Wave Sensing Scheduling Protocols for Object-Tracking Applications}, booktitle = {Distributed Computing in Sensor Systems, First {IEEE} International Conference, {DCOSS} 2005, Marina del Rey, CA, USA, June 30 - July 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3560}, pages = {228--243}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502593\_19}, doi = {10.1007/11502593\_19}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dcoss/RenLWZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ChenRWZ05, author = {Xin Chen and Shansi Ren and Haining Wang and Xiaodong Zhang}, title = {{SCOPE:} scalable consistency maintenance in structured {P2P} systems}, booktitle = {{INFOCOM} 2005. 24th Annual Joint Conference of the {IEEE} Computer and Communications Societies, 13-17 March 2005, Miami, FL, {USA}}, pages = {1502--1513}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/INFCOM.2005.1498434}, doi = {10.1109/INFCOM.2005.1498434}, timestamp = {Wed, 16 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/ChenRWZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/RenLWCZ05, author = {Shansi Ren and Qun Li and Haining Wang and Xin Chen and Xiaodong Zhang}, editor = {Hermann de Meer and Nina T. Bhatti}, title = {Analyzing Object Detection Quality Under Probabilistic Coverage in Sensor Networks}, booktitle = {Quality of Service - IWQoS 2005: 13th International Workshop, IWQoS 2005, Passau, Germany, June 21-23, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3552}, pages = {107--122}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11499169\_10}, doi = {10.1007/11499169\_10}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwqos/RenLWCZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/YinW05, author = {Heng Yin and Haining Wang}, editor = {Patrick D. McDaniel}, title = {Building an Application-aware IPsec Policy System}, booktitle = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005}, publisher = {{USENIX} Association}, year = {2005}, url = {https://www.usenix.org/conference/14th-usenix-security-symposium/building-application-aware-ipsec-policy-system}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/YinW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhsn/WangS04, author = {Haining Wang and Kang G. Shin}, title = {Robust {TCP} congestion recovery}, journal = {J. High Speed Networks}, volume = {13}, number = {2}, pages = {103--121}, year = {2004}, url = {http://content.iospress.com/articles/journal-of-high-speed-networks/jhs238}, timestamp = {Mon, 18 May 2015 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhsn/WangS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangZS04, author = {Haining Wang and Danlu Zhang and Kang G. Shin}, title = {Change-Point Monitoring for the Detection of DoS Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {1}, number = {4}, pages = {193--208}, year = {2004}, url = {https://doi.org/10.1109/TDSC.2004.34}, doi = {10.1109/TDSC.2004.34}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangZS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/WangBES04, author = {Haining Wang and Abhijit Bose and Mohamed A. El{-}Gendy and Kang G. Shin}, title = {{IP} Easy-pass: Edge Resource Access Control}, booktitle = {Proceedings {IEEE} {INFOCOM} 2004, The 23rd Annual Joint Conference of the {IEEE} Computer and Communications Societies, Hong Kong, China, March 7-11, 2004}, pages = {2583--2593}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/INFCOM.2004.1354678}, doi = {10.1109/INFCOM.2004.1354678}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/WangBES04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/us/Wang03, author = {Haining Wang}, title = {Countering distributed denial of service attacks}, school = {University of Michigan, {USA}}, year = {2003}, url = {https://hdl.handle.net/2027.42/123973}, timestamp = {Fri, 06 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Wang03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/WangS03, author = {Haining Wang and Kang G. Shin}, title = {Transport-Aware {IP} Routers: {A} Built-In Protection Mechanism to Counter DDoS Attacks}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {14}, number = {9}, pages = {873--884}, year = {2003}, url = {https://doi.org/10.1109/TPDS.2003.1233710}, doi = {10.1109/TPDS.2003.1233710}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/WangS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JinWS03, author = {Cheng Jin and Haining Wang and Kang G. Shin}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {Hop-count filtering: an effective defense against spoofed DDoS traffic}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {30--41}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948116}, doi = {10.1145/948109.948116}, timestamp = {Tue, 10 Nov 2020 20:00:42 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JinWS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/El-GendyBWS03, author = {Mohamed A. El{-}Gendy and Abhijit Bose and Haining Wang and Kang G. Shin}, editor = {Kevin Jeffay and Ion Stoica and Klaus Wehrle}, title = {Statistical Characterization for Per-hop QoS}, booktitle = {Quality of Service - IWQoS 2003, 11th International Workshop, Berkeley, CA, USA, June 2-4, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2707}, pages = {21--40}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-44884-5\_2}, doi = {10.1007/3-540-44884-5\_2}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/iwqos/El-GendyBWS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/WangZS02, author = {Haining Wang and Danlu Zhang and Kang G. Shin}, title = {SYN-dog: Sniffing {SYN} Flooding Sources}, booktitle = {Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), Vienna, Austria, July 2-5, 2002}, pages = {421--428}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/ICDCS.2002.1022280}, doi = {10.1109/ICDCS.2002.1022280}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/WangZS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/WangZS02, author = {Haining Wang and Danlu Zhang and Kang G. Shin}, title = {Detecting {SYN} Flooding Attacks}, booktitle = {Proceedings {IEEE} {INFOCOM} 2002, The 21st Annual Joint Conference of the {IEEE} Computer and Communications Societies, New York, USA, June 23-27, 2002}, pages = {1530--1539}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/INFCOM.2002.1019404}, doi = {10.1109/INFCOM.2002.1019404}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/WangZS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rtas/WangS02, author = {Haining Wang and Kang G. Shin}, title = {Layer-4 Service Differentiation and Resource Isolation}, booktitle = {Proceedings of the 8th {IEEE} Real-Time and Embedded Technology and Applications Symposium {(RTAS} 2002), 24-27 September 2002, San Jose, CA, {USA}}, pages = {67--78}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/RTTAS.2002.1137382}, doi = {10.1109/RTTAS.2002.1137382}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rtas/WangS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/WangSS01, author = {Haining Wang and Chia Shen and Kang G. Shin}, title = {Adaptive-weighted packet scheduling for premium service}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2001, June 11-14, Helsinki, Finland}, pages = {1846--1850}, publisher = {{IEEE}}, year = {2001}, url = {https://doi.org/10.1109/ICC.2001.937110}, doi = {10.1109/ICC.2001.937110}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/WangSS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/WangS01, author = {Haining Wang and Kang G. Shin}, title = {Robust {TCP} Congestion Recovery}, booktitle = {Proceedings of the 21st International Conference on Distributed Computing Systems {(ICDCS} 2001), Phoenix, Arizona, USA, April 16-19, 2001}, pages = {199--206}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ICDSC.2001.918949}, doi = {10.1109/ICDSC.2001.918949}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/WangS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/WangSXR00, author = {Haining Wang and Kang G. Shin and Hongjie Xin and Douglas S. Reeves}, title = {A Simple Refinement of Slow-Start of {TCP} Congestion Control}, booktitle = {Proceedings of the Fifth {IEEE} Symposium on Computers and Communications {(ISCC} 2000), 4-6 July 2000, Antibes, France}, pages = {98--105}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ISCC.2000.860615}, doi = {10.1109/ISCC.2000.860615}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/WangSXR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/WidjajaWWC99, author = {Indra Widjaja and Haining Wang and Steven Wright and Amalendu Chatterjee}, title = {Scalability Evaluation of Multi-Protocol Over {ATM} {(MPOA)}}, booktitle = {Proceedings {IEEE} {INFOCOM} '99, The Conference on Computer Communications, Eighteenth Annual Joint Conference of the {IEEE} Computer and Communications Societies, The Future Is Now, New York, NY, USA, March 21-25, 1999}, pages = {1505--1512}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/INFCOM.1999.752172}, doi = {10.1109/INFCOM.1999.752172}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/WidjajaWWC99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mascots/WangW98, author = {Haining Wang and Carey L. Williamson}, title = {A New Scheme for {TCP} Congestion Control: Smooth-Start and Dynamic Recovery}, booktitle = {{MASCOTS} 1998, Proceedings of the Sixth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, 19-24 July, 1998, Montreal, Canada}, pages = {69--76}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/MASCOT.1998.693677}, doi = {10.1109/MASCOT.1998.693677}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mascots/WangW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.