Twitter trends manipulation: a first look inside the security of twitter trending Y Zhang, X Ruan, H Wang, H Wang, S He IEEE Transactions on Information Forensics and Security 12 (1), 144-156, 2016 | 61 | 2016 |
Casino royale: a deep exploration of illegal online gambling H Yang, K Du, Y Zhang, S Hao, Z Li, M Liu, H Wang, H Duan, Y Shi, X Su, ... Proceedings of the 35th Annual Computer Security Applications Conference …, 2019 | 34 | 2019 |
{End-Users} get maneuvered: Empirical analysis of redirection hijacking in content delivery networks S Hao, Y Zhang, H Wang, A Stavrou 27th USENIX Security Symposium (USENIX Security 18), 1129-1145, 2018 | 31 | 2018 |
Understanding human dynamics in microblog posting activities Z Jiang, Y Zhang, H Wang, P Li Journal of Statistical Mechanics: Theory and Experiment 2013 (02), P02006, 2013 | 15 | 2013 |
Understanding promotion-as-a-service on GitHub K Du, H Yang, Y Zhang, H Duan, H Wang, S Hao, Z Li, M Yang Proceedings of the 36th Annual Computer Security Applications Conference …, 2020 | 11 | 2020 |
What scale of audience a campaign can reach in what price on twitter? Y Zhang, X Ruan, H Wang, H Wang IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 1168-1176, 2014 | 11 | 2014 |
Understanding the manipulation on recommender systems through web injection Y Zhang, J Xiao, S Hao, H Wang, S Zhu, S Jajodia IEEE Transactions on Information Forensics and Security 15, 3807-3818, 2019 | 9 | 2019 |
The benefits of network coding in distributed caching in large-scale P2P-VoD systems H Wang, Y Zhang, P Li, Z Jiang 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-6, 2010 | 9 | 2010 |
How can peers assist each other in large-scale P2P-VoD systems Y Zhang, H Wang, P Li, Z Jiang, C Gao 2010 International Conference on Multimedia Information Networking and …, 2010 | 5 | 2010 |
Mingling of clear and muddy water: Understanding and detecting semantic confusion in blackhat seo H Yang, K Du, Y Zhang, S Hao, H Wang, J Zhang, H Duan Computer Security–ESORICS 2021: 26th European Symposium on Research in …, 2021 | 4 | 2021 |
Modeling analysis of server loading in large-scale P2P-VoD systems with actively collaborative helpers Y Zhang, H Wang, P Li, Z Jiang Telecommunication Systems 54 (3), 215-227, 2013 | 2 | 2013 |
Dial" N" for NXDomain: The Scale, Origin, and Security Implications of DNS Queries to Non-Existent Domains G Liu, L Jin, S Hao, Y Zhang, D Liu, A Stavrou, H Wang Proceedings of the 2023 ACM on Internet Measurement Conference, 198-212, 2023 | 1 | 2023 |
Characterizing top user behavior of Sina microblogging in the context of different events Y Zhang, H Wang, Z Jiang, P Li 2012 International Conference on Computing, Networking and Communications …, 2012 | 1 | 2012 |
Review Trade: Everything Is Free in Incentivized Review Groups Y Zhang, S Hao, H Wang Security and Privacy in Communication Networks: 16th EAI International …, 2020 | | 2020 |
Understanding and defending vulnerabilities of web-based information systems Y Zhang University of Delaware, 2020 | | 2020 |
A geographic analysis of P2P-TV viewership Z Jiang, H Wang, Y Zhang, P Li Proceedings of 2011 IEEE International Conference on Intelligence and …, 2011 | | 2011 |