Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Haining
    Last name: Wang
    DBLP: 81/4036
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 100 of 155  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Yubao Zhang, Xin Ruan, Haining Wang, Hui Wang, Su He.
    Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending.
    IEEE Trans. Information Forensics and Security 2017, Volume 12 (0) 2017
    Journal article
    Shuai Hao, Haining Wang.
    Exploring Domain Name Based Features on the Effectiveness of DNS Caching.
    Computer Communication Review 2017, Volume 47 (0) 2017
    Conference paper
    Haitao Xu, Daiping Liu, Haining Wang, Angelos Stavrou.
    An Empirical Investigation of Ecommerce-Reputation-Escalation-as-a-Service.
    TWEB 2017, Volume 11 (0) 2017
    Conference paper
    Xing Gao, Zhang Xu, Haining Wang, Li Li, Xiaorui Wang.
    Why "Some" Like It Hot Too: Thermal Attack on Data Centers.
    Proceedings of the 2017 ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, Urbana-Champaign, IL, USA, June 05 - 09, 2017 2017 (0) 2017
    Conference paper
    Qiang Li, Xuan Feng, Haining Wang, Limin Sun.
    Automatically Discovering Surveillance Devices in the Cyberspace.
    Proceedings of the 8th ACM on Multimedia Systems Conference, MMSys 2017, Taipei, Taiwan, June 20-23, 2017 2017 (0) 2017
    Conference paper
    Xing Gao, Dachuan Liu, Daiping Liu, Haining Wang, Angelos Stavrou.
    E-Android: A New Energy Profiling Tool for Smartphones.
    37th IEEE International Conference on Distributed Computing Systems, ICDCS 2017, Atlanta, GA, USA, June 5-8, 2017 2017 (0) 2017
    Conference paper
    Dachuan Liu, Xing Gao, Haining Wang.
    Location Privacy Breach: Apps Are Watching You in Background.
    37th IEEE International Conference on Distributed Computing Systems, ICDCS 2017, Atlanta, GA, USA, June 5-8, 2017 2017 (0) 2017
    Conference paper
    Yue Li, Haining Wang, Kun Sun.
    Personal Information in Passwords and Its Security Implications.
    IEEE Trans. Information Forensics and Security 2017, Volume 12 (0) 2017
    Conference paper
    Yue Li, Nan Zheng, Haining Wang, Kun Sun, Hui Fang.
    A measurement study on Amazon wishlist and its privacy exposure.
    IEEE International Conference on Communications, ICC 2017, Paris, France, May 21-25, 2017 2017 (0) 2017
    Conference paper
    Xing Gao, Zhongshu Gu, Mehmet Kayaalp, Dimitrios Pendarakis, Haining Wang.
    ContainerLeaks: Emerging Security Threats of Information Leakages in Container Clouds.
    47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017, Denver, CO, USA, June 26-29, 2017 2017 (0) 2017
    Conference paper
    Daiping Liu, Xing Gao, Mingwei Zhang, Haining Wang, Angelos Stavrou.
    Detecting Passive Cheats in Online Games via Performance-Skillfulness Inconsistency.
    47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017, Denver, CO, USA, June 26-29, 2017 2017 (0) 2017
    Conference paper
    Xin Ruan, Zhenyu Wu, Haining Wang, Sushil Jajodia.
    Profiling Online Social Behaviors for Compromised Account Detection.
    IEEE Transactions on Information Forensics and Security 2016, Volume 11 (0) 2016
    Conference paper
    Zhen Ren, Xin Qi, Gang Zhou, Haining Wang, David T. Nguyen.
    Throughput Assurance for Multiple Body Sensor Networks.
    IEEE Trans. Parallel Distrib. Syst. 2016, Volume 27 (0) 2016
    Conference paper
    Xing Gao, Dachuan Liu, Daiping Liu, Haining Wang.
    On Energy Security of Smartphones.
    Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, CODASPY 2016, New Orleans, LA, USA, March 9-11, 2016 2016 (0) 2016
    Conference paper
    Nan Zheng, Aaron Paloski, Haining Wang.
    An Efficient User Verification System Using Angle-Based Mouse Movement Biometrics.
    ACM Trans. Inf. Syst. Secur. 2015, Volume 18 (0) 2016
    Conference paper
    Aaron Koehl, Haining Wang.
    SERF: optimization of socially sourced images using psychovisual enhancements.
    Proceedings of the 7th International Conference on Multimedia Systems, MMSys 2016, Klagenfurt, Austria, May 10-13, 2016 2016 (0) 2016
    Conference paper
    Daiping Liu, Xing Gao, Mingwei Zhang, Haining Wang.
    Shoot for the Moon and You Will Never Miss: Characterizing and Detecting Aimbots in Online Games.
    Proceedings of the 2016 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Science, Antibes Juan-Les-Pins, France, June 14-18, 2016 2016 (0) 2016
    Conference paper
    Jidong Xiao, Lei Lu, Hai Huang, Haining Wang.
    Hyperprobe: Towards Virtual Machine Extrospection.
    2016 USENIX Annual Technical Conference, USENIX ATC 2016, Denver, CO, USA, June 22-24, 2016. 2016 (0) 2016
    Conference paper
    Haining Wang, Zhi Ding.
    Joint power and rate optimization for co-channel small cells using Frank-Wolfe algorithm.
    2016 IEEE International Conference on Communications, ICC 2016, Kuala Lumpur, Malaysia, May 22-27, 2016 2016 (0) 2016
    Conference paper
    Haining Wang, Chenxi Zhu, Zhi Ding.
    Femtocell Power Control for Interference Management Based on Macrolayer Feedback.
    IEEE T. Vehicular Technology 2016, Volume 65 (0) 2016
    Conference paper
    Yue Li, Haining Wang, Kun Sun.
    A study of personal information in human-chosen passwords and its security implications.
    35th Annual IEEE International Conference on Computer Communications, INFOCOM 2016, San Francisco, CA, USA, April 10-14, 2016 2016 (0) 2016
    Conference paper
    Jidong Xiao, Lei Lu, Haining Wang, Xiaoyun Zhu.
    HyperLink: Virtual Machine Introspection and Memory Forensic Analysis without Kernel Source Code.
    2016 IEEE International Conference on Autonomic Computing, ICAC 2016, Wuerzburg, Germany, July 17-22, 2016 2016 (0) 2016
    Conference paper
    Dachuan Liu, Haining Wang, Gang Zhou, Weizhen Mao, Boyang Li.
    Arbitrating Traffic Contention for Power Saving with Multiple PSM Clients.
    IEEE Transactions on Wireless Communications 2016, Volume 15 (0) 2016
    Conference paper
    Daiping Liu, Shuai Hao, Haining Wang.
    All Your DNS Records Point to Us: Understanding the Security Threats of Dangling DNS Records.
    Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016 2016 (0) 2016
    Conference paper
    Zhang Xu, Zhenyu Wu, Zhichun Li, Kangkook Jee, Junghwan Rhee, Xusheng Xiao, Fengyuan Xu, Haining Wang, Guofei Jiang.
    High Fidelity Data Reduction for Big Data Security Dependency Analyses.
    Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016 2016 (0) 2016
    Conference paper
    Xuan Feng, Qiang Li 0007, Haining Wang, Limin Sun.
    ASCEND: A search engine for online industrial control devices.
    24th IEEE International Conference on Network Protocols, ICNP 2016, Singapore, November 8-11, 2016 2016 (0) 2016
    Conference paper
    Qiang Li 0007, Xuan Feng, Zhi Li 0018, Haining Wang, Limin Sun.
    GUIDE: Graphical user interface fingerprints physical devices.
    24th IEEE International Conference on Network Protocols, ICNP 2016, Singapore, November 8-11, 2016 2016 (0) 2016
    Conference paper
    Xuan Feng, Qiang Li 0007, Haining Wang, Limin Sun.
    Characterizing industrial control system devices on the Internet.
    24th IEEE International Conference on Network Protocols, ICNP 2016, Singapore, November 8-11, 2016 2016 (0) 2016
    Conference paper
    Nicolas Van Balen, Christopher T. Ball, Haining Wang.
    A Behavioral Biometrics Based Approach to Online Gender Classification.
    Security and Privacy in Communication Networks - 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings 2017 (0) 2016
    Conference paper
    Gang Lu, Jianfeng Zhan, Haining Wang, Lin Yuan, Yunwei Gao, Chuliang Weng, Yong Qi.
    PowerTracer: Tracing Requests in Multi-Tier Services to Reduce Energy Inefficiency.
    IEEE Trans. Computers 2015, Volume 64 (0) 2015
    Conference paper
    Haining Wang, Zhi Ding.
    Power Control and Resource Allocation for Outage Balancing in Femtocell Networks.
    IEEE Transactions on Wireless Communications 2015, Volume 14 (0) 2015
    Conference paper
    Zhenyu Wu, Zhang Xu, Haining Wang.
    Whispers in the Hyper-Space: High-Bandwidth and Reliable Covert Channel Attacks Inside the Cloud.
    IEEE/ACM Trans. Netw. 2015, Volume 23 (0) 2015
    Conference paper
    Fengwei Zhang, Kevin Leach, Haining Wang, Angelos Stavrou.
    TrustLogin: Securing Password-Login on Commodity Operating Systems.
    Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015 2015 (0) 2015
    Conference paper
    Haitao Xu, Daiping Liu, Haining Wang, Angelos Stavrou.
    E-commerce Reputation Manipulation: The Emergence of Reputation-Escalation-as-a-Service.
    Proceedings of the 24th International Conference on World Wide Web, WWW 2015, Florence, Italy, May 18-22, 2015 2015 (0) 2015
    Conference paper
    Fengwei Zhang, Kevin Leach, Angelos Stavrou, Haining Wang, Kun Sun.
    Using Hardware Features for Increased Debugging Transparency.
    2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, May 17-21, 2015 2015 (0) 2015
    Conference paper
    Zhang Xu, Haining Wang, Zhenyu Wu.
    A Measurement Study on Co-residence Threat inside the Cloud.
    24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015. 2015 (0) 2015
    Conference paper
    He Sun, Kun Sun, Yuewu Wang, Jiwu Jing, Haining Wang.
    TrustICE: Hardware-Assisted Isolated Computing Environments on Mobile Devices.
    45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2015, Rio de Janeiro, Brazil, June 22-25, 2015 2015 (0) 2015
    Conference paper
    Haitao Xu, Haining Wang, Angelos Stavrou.
    Privacy Risk Assessment on Online Photos.
    Research in Attacks, Intrusions, and Defenses - 18th International Symposium, RAID 2015, Kyoto, Japan, November 2-4, 2015, Proceedings 2015 (0) 2015
    Conference paper
    Haining Wang, Jiaheng Wang, Zhi Ding.
    Distributed Power Control in a Two-Tier Heterogeneous Network.
    IEEE Transactions on Wireless Communications 2015, Volume 14 (0) 2015
    Conference paper
    Dachuan Liu, Bo Dong, Xing Gao, Haining Wang.
    Exploiting Eye Tracking for Smartphone Authentication.
    Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers 2015 (0) 2015
    Conference paper
    Xing Gao, Dachuan Liu, Haining Wang, Kun Sun.
    PmDroid: Permission Supervision for Android Advertising.
    34th IEEE Symposium on Reliable Distributed Systems, SRDS 2015, Montreal, QC, Canada, September 28 - October 1, 2015 2015 (0) 2015
    Conference paper
    Jidong Xiao, Hai Huang, Haining Wang.
    Defeating Kernel Driver Purifier.
    Security and Privacy in Communication Networks - 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers 2015 (0) 2015
    Conference paper
    Jidong Xiao, Hai Huang, Haining Wang.
    Kernel Data Attack Is a Realistic Security Threat.
    Security and Privacy in Communication Networks - 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers 2015 (0) 2015
    Conference paper
    Shuai Hao, Haining Wang, Angelos Stavrou, Evgenia Smirni.
    On the DNS Deployment of Modern Web Services.
    23rd IEEE International Conference on Network Protocols, ICNP 2015, San Francisco, CA, USA, November 10-13, 2015 2015 (0) 2015
    Conference paper
    Jidong Xiao, Lei Lu, Hai Huang, Haining Wang.
    Hyperprobe: Towards Virtual Machine Extrospection.
    29th Large Installation System Administration Conference, LISA 2015, Washington, D.C., USA, November 8-13, 2015. 2015 (0) 2015
    Conference paper
    Hemant Sengar, Haining Wang, Seyed Amir Iranmanesh.
    Wiretap-proof: what they hear is not what you speak, and what you speak they do not hear.
    Fourth ACM Conference on Data and Application Security and Privacy, CODASPY'14, San Antonio, TX, USA - March 03 - 05, 2014 2014 (0) 2014
    Conference paper
    Brett Cooley, Haining Wang, Angelos Stavrou.
    Activity Spoofing and Its Defense in Android Smartphones.
    Applied Cryptography and Network Security - 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Yubao Zhang, Xin Ruan, Haining Wang, Hui Wang.
    What scale of audience a campaign can reach in what price on Twitter?
    2014 IEEE Conference on Computer Communications, INFOCOM 2014, Toronto, Canada, April 27 - May 2, 2014 2014 (0) 2014
    Conference paper
    Fengwei Zhang, Haining Wang, Kevin Leach, Angelos Stavrou.
    A Framework to Secure Peripherals at Runtime.
    Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I 2014 (0) 2014
    Conference paper
    Haitao Xu, Daiping Liu, Aaron Koehl, Haining Wang, Angelos Stavrou.
    Click Fraud Detection on the Advertiser Side.
    Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II 2014 (0) 2014
    Conference paper
    Haining Wang, Zhi Ding.
    Macrocell-Queue-Stabilization-Based Power Control of Femtocell Networks.
    IEEE Transactions on Wireless Communications 2014, Volume 13 (0) 2014
    Conference paper
    Daiping Liu, Haining Wang, Angelos Stavrou.
    Detecting Malicious Javascript in PDF through Document Instrumentation.
    44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2014, Atlanta, GA, USA, June 23-26, 2014 2014 (0) 2014
    Conference paper
    Zhang Xu, Haining Wang, Zichen Xu, Xiaorui Wang.
    Power Attack: An Increasing Threat to Data Centers.
    21st Annual Network and Distributed System Security Symposium, NDSS 2014, San Diego, California, USA, February 23-26, 2014 2014 (0) 2014
    Conference paper
    Nan Zheng, Kun Bai, Hai Huang, Haining Wang.
    You Are How You Touch: User Verification on Smartphones via Tapping Behaviors.
    22nd IEEE International Conference on Network Protocols, ICNP 2014, Raleigh, NC, USA, October 21-24, 2014 2014 (0) 2014
    Conference paper
    Zhang Xu, Haining Wang, Sushil Jajodia.
    Gemini: An Emergency Line of Defense against Phishing Attacks.
    33rd IEEE International Symposium on Reliable Distributed Systems, SRDS 2014, Nara, Japan, October 6-9, 2014 2014 (0) 2014
    Conference paper
    Duy Le, Jidong Xiao, Hai Huang, Haining Wang.
    Shadow patching: Minimizing maintenance windows in a virtualized enterprise environment.
    10th International Conference on Network and Service Management, CNSM 2014 and Workshop, Rio de Janeiro, Brazil, November 17-21, 2014 2014 (0) 2014
    Conference paper
    Haining Wang, Zhi Ding.
    Power control and rate allocation for outage balancing in femtocell networks.
    IEEE Global Communications Conference, GLOBECOM 2014, Austin, TX, USA, December 8-12, 2014 2014 (0) 2014
    Journal article
    Zhen Ren, Xin Qi, Gang Zhou, Haining Wang.
    Exploiting the Data Sensitivity of Neurometric Fidelity for Optimizing EEG Sensing.
    IEEE Internet of Things Journal 2014, Volume 1 (0) 2014
    Conference paper
    Nicolas Van Balen, Haining Wang.
    GridMap: Enhanced Security in Cued-Recall Graphical Passwords.
    International Conference on Security and Privacy in Communication Networks - 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I 2015 (0) 2014
    Conference paper
    Zi Chu, Steven Gianvecchio, Aaron Koehl, Haining Wang, Sushil Jajodia.
    Blog or block: Detecting blog bots through behavioral biometrics.
    Computer Networks 2013, Volume 57 (0) 2013
    Journal article
    Kun-Yu Wang, Haining Wang, Zhi Ding, Chong-Yung Chi.
    Low-Complexity Algorithm for Worst-Case Utility Maximization in Multiuser MISO Downlink
    CoRR 2013, Volume 0 (0) 2013
    Journal article
    Michal Cierny, Haining Wang, Risto Wichman, Zhi Ding, Carl Wijting.
    On Number of Almost Blank Subframes in Heterogeneous Cellular Networks
    CoRR 2013, Volume 0 (0) 2013
    Conference paper
    Chuan Yue, Haining Wang.
    A measurement study of insecure javascript practices on the web.
    TWEB 2013, Volume 7 (0) 2013
    Conference paper
    Jing Jin, A. Jefferson Offutt, Nan Zheng, Feng Mao, Aaron Koehl, Haining Wang.
    Evasive bots masquerading as human beings on the web.
    2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Budapest, Hungary, June 24-27, 2013 2013 (0) 2013
    Conference paper
    Jidong Xiao, Zhang Xu, Hai Huang, Haining Wang.
    Security implications of memory deduplication in a virtualized environment.
    2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Budapest, Hungary, June 24-27, 2013 2013 (0) 2013
    Conference paper
    Haining Wang, Zhi Ding, Michal Cierny, Risto Wichman.
    Time domain bi-level downlink power control for cross-tier interference mitigation in HetNet.
    Proceedings of IEEE International Conference on Communications, ICC 2013, Budapest, Hungary, June 9-13, 2013 2013 (0) 2013
    Conference paper
    Xin Ruan, Chuan Yue, Haining Wang.
    Unveiling Privacy Setting Breaches in Online Social Networks.
    Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers 2013 (0) 2013
    Conference paper
    Michal Cierny, Haining Wang, Risto Wichman, Zhi Ding, Carl Wijting.
    On Number of Almost Blank Subframes in Heterogeneous Cellular Networks.
    IEEE Transactions on Wireless Communications 2013, Volume 12 (0) 2013
    Conference paper
    Zhenyu Wu, Yueping Zhang, Vishal K. Singh, Guofei Jiang, Haining Wang.
    Automating Cloud Network Optimization and Evolution.
    IEEE Journal on Selected Areas in Communications 2013, Volume 31 (0) 2013
    Conference paper
    Kun-Yu Wang, Haining Wang, Zhi Ding, Chong-Yung Chi.
    A Low-Complexity Algorithm for Worst-Case Utility Maximization in Multiuser MISO Downlink.
    Proceedings of the 78th IEEE Vehicular Technology Conference, VTC Fall 2013, Las Vegas, NV, USA, September 2-5, 2013 2013 (0) 2013
    Journal article
    Mengjun Xie, Zhenyu Wu, Haining Wang.
    Secure instant messaging in enterprise-like networks.
    Computer Networks 2012, Volume 56 (0) 2012
    Conference paper
    Aaron Koehl, Haining Wang.
    Surviving a search engine overload.
    Proceedings of the 21st World Wide Web Conference 2012, WWW 2012, Lyon, France, April 16-20, 2012 2012 (0) 2012
    Conference paper
    Bo Sang, Jianfeng Zhan, Gang Lu, Haining Wang, Dongyan Xu, Lei Wang 0004, Zhihong Zhang, Zhen Jia.
    Precise, Scalable, and Online Request Tracing for Multitier Services of Black Boxes.
    IEEE Trans. Parallel Distrib. Syst. 2012, Volume 23 (0) 2012
    Conference paper
    Mengjun Xie, Indra Widjaja, Haining Wang.
    Enhancing cache robustness for content-centric networking.
    Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012 2012 (0) 2012
    Conference paper
    Zi Chu, Indra Widjaja, Haining Wang.
    Detecting Social Spam Campaigns on Twitter.
    Applied Cryptography and Network Security - 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Zhenyu Wu, Mengjun Xie, Haining Wang.
    On Energy Security of Server Systems.
    IEEE Trans. Dependable Sec. Comput. 2012, Volume 9 (0) 2012
    Conference paper
    Zi Chu, Steven Gianvecchio, Haining Wang, Sushil Jajodia.
    Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg?
    IEEE Trans. Dependable Sec. Comput. 2012, Volume 9 (0) 2012
    Conference paper
    Jidong Xiao, Zhang Xu, Hai Huang, Haining Wang.
    A covert channel construction in a virtualized environment.
    the ACM Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012 2012 (0) 2012
    Conference paper
    Zhenyu Wu, Yueping Zhang, Vishal K. Singh, Guofei Jiang, Haining Wang.
    NetDEO: Automating network design, evolution, and optimization.
    20th IEEE International Workshop on Quality of Service, IWQoS 2012, Coimbra, Portugal, June 4-5, 2012 2012 (0) 2012
    Conference paper
    Aaron Koehl, Haining Wang.
    m.Site: Efficient Content Adaptation for Mobile Devices.
    Middleware 2012 - ACM/IFIP/USENIX 13th International Middleware Conference, Montreal, QC, Canada, December 3-7, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Gang Lu, Jianfeng Zhan, Haining Wang, Lin Yuan, Chuliang Weng.
    PowerTracer: tracing requests in multi-tier services to diagnose energy inefficiency.
    9th International Conference on Autonomic Computing, ICAC'12, San Jose, CA, USA, September 16 - 20, 2012 2012 (0) 2012
    Conference paper
    Zhenyu Wu, Zhang Xu, Haining Wang.
    Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud.
    Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012 2012 (0) 2012
    Conference paper
    Duy Le, Hai Huang, Haining Wang.
    Understanding performance implications of nested file systems in a virtualized environment.
    Proceedings of the 10th USENIX conference on File and Storage Technologies, FAST 2012, San Jose, CA, USA, February 14-17, 2012 2012 (0) 2012
    Conference paper
    Seyed Amir Iranmanesh, Hemant Sengar, Haining Wang.
    A Voice Spam Filter to Clean Subscribers' Mailbox.
    Security and Privacy in Communication Networks - 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers 2013 (0) 2012
    Conference paper
    Zi Chu, Haining Wang.
    An investigation of hotlinking and its countermeasures.
    Computer Communications 2011, Volume 34 (0) 2011
    Conference paper
    Zhen Ren, Gang Zhou, Andrew J. Pyles, Matthew Keally, Weizhen Mao, Haining Wang.
    BodyT2: Throughput and time delay performance assurance for heterogeneous BSNs.
    INFOCOM 2011. 30th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 10-15 April 2011, Shanghai, China 2011 (0) 2011
    Conference paper
    Yang Xiang, Javier Lopez, Haining Wang, Wanlei Zhou.
    Special Issue: Securing Distributed Networks and Systems.
    Concurrency and Computation: Practice and Experience 2011, Volume 23 (0) 2011
    Conference paper
    Duy Le, Haining Wang.
    An Effective Memory Optimization for Virtual Machine-Based Systems.
    IEEE Trans. Parallel Distrib. Syst. 2011, Volume 22 (0) 2011
    Conference paper
    Nan Zheng, Aaron Paloski, Haining Wang.
    An efficient user verification system via mouse movements.
    Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011 2011 (0) 2011
    Conference paper
    Steven Gianvecchio, Mengjun Xie, Zhenyu Wu, Haining Wang.
    Humans and Bots in Internet Chat: Measurement, Analysis, and Automated Classification.
    IEEE/ACM Trans. Netw. 2011, Volume 19 (0) 2011
    Conference paper
    Zhenyu Wu, Mengjun Xie, Haining Wang.
    Design and Implementation of a Fast Dynamic Packet Filter.
    IEEE/ACM Trans. Netw. 2011, Volume 19 (0) 2011
    Conference paper
    Steven Gianvecchio, Haining Wang.
    An Entropy-Based Approach to Detecting Covert Timing Channels.
    IEEE Trans. Dependable Sec. Comput. 2011, Volume 8 (0) 2011
    Conference paper
    Zhenyu Wu, Mengjun Xie, Haining Wang.
    Energy Attack on Server Systems.
    5th USENIX Workshop on Offensive Technologies, WOOT'11, August 8, 2011, San Francisco, CA, USA, Proceedings 2011 (0) 2011
    Conference paper
    Chuan Yue, Haining Wang.
    BogusBiter: A transparent protection against phishing attacks.
    ACM Trans. Internet Techn. 2010, Volume 10 (0) 2010
    Journal article
    Lin Yuan, Jianfeng Zhan, Bo Sang, Lei Wang, Haining Wang.
    PowerTracer: Tracing requests in multi-tier services to save cluster power consumption
    CoRR 2010, Volume 0 (0) 2010
    Conference paper
    Mengjun Xie, Haining Wang.
    A Collaboration-based Autonomous Reputation System for Email Services.
    INFOCOM 2010. 29th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 15-19 March 2010, San Diego, CA, USA 2010 (0) 2010
    Conference paper
    Hemant Sengar, Zhen Ren, Haining Wang, Duminda Wijesekera, Sushil Jajodia.
    Tracking Skype VoIP Calls Over The Internet.
    INFOCOM 2010. 29th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 15-19 March 2010, San Diego, CA, USA 2010 (0) 2010
    Conference paper
    Chuan Yue, Mengjun Xie, Haining Wang.
    An automatic HTTP cookie management system.
    Computer Networks 2010, Volume 54 (0) 2010
    Journal article
    Heng Yin, Bo Sheng, Haining Wang, Jianping Pan.
    Keychain-Based Signatures for Securing BGP.
    IEEE Journal on Selected Areas in Communications 2010, Volume 28 (0) 2010
    Conference paper
    Zhenyu Wu, Steven Gianvecchio, Mengjun Xie, Haining Wang.
    Mimimorphism: a new approach to binary code obfuscation.
    Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, 2010 2010 (0) 2010
    Show item 1 to 100 of 155  

    Your query returned 155 matches in the database.