Follow
Hang Hu
Hang Hu
Verified email at vt.edu - Homepage
Title
Cited by
Cited by
Year
Needle in a haystack: Tracking down elite phishing domains in the wild
K Tian, STK Jan, H Hu, D Yao, G Wang
Proceedings of the Internet Measurement Conference 2018, 429-442, 2018
842018
Understanding the reproducibility of crowd-reported security vulnerabilities
D Mu, A Cuevas, L Yang, H Hu, X Xing, B Mao, G Wang
27th USENIX Security Symposium (USENIX Security 18), 919-936, 2018
692018
The Next Domino to Fall: Empirical Analysis of User Passwords across Online Services
C Wang, STK Jan, H Hu, D Bossart, G Wang
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
652018
{End-to-End} Measurements of Email Spoofing Attacks
H Hu, G Wang
27th USENIX Security Symposium (USENIX Security 18), 1095-1112, 2018
602018
What happens after you leak your password: Understanding credential sharing on phishing sites
P Peng, C Xu, L Quinn, H Hu, B Viswanath, G Wang
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
252019
Towards understanding the adoption of anti-spoofing protocols in email systems
H Hu, P Peng, G Wang
2018 IEEE Cybersecurity Development (SecDev), 94-101, 2018
182018
Read between the lines: An empirical measurement of sensitive applications of voice personal assistant systems
FH Shezan, H Hu, J Wang, G Wang, Y Tian
Proceedings of The Web Conference 2020, 1006-1017, 2020
152020
Revisiting email spoofing attacks
H Hu, G Wang
arXiv preprint arXiv:1801.00853, 2018
152018
Characterizing pixel tracking through the lens of disposable email services
H Hu, P Peng, G Wang
2019 IEEE Symposium on Security and Privacy (SP), 365-379, 2019
142019
Verhealth: Vetting medical voice applications through policy enforcement
FH Shezan, H Hu, G Wang, Y Tian
Proceedings of the ACM on interactive, mobile, wearable and ubiquitous …, 2020
72020
A case study of the security vetting process of smart-home assistant applications
H Hu, L Yang, S Lin, G Wang
2020 IEEE Security and Privacy Workshops (SPW), 76-81, 2020
72020
Assessing Browser-level Defense against {IDN-based} Phishing
H Hu, STK Jan, Y Wang, G Wang
30th USENIX Security Symposium (USENIX Security 21), 3739-3756, 2021
62021
Empirical analysis of password reuse and modification across online service
C Wang, STK Jan, H Hu, G Wang
arXiv preprint arXiv:1706.01939, 2017
62017
Security vetting process of smart-home assistant applications: A first look and case studies
H Hu, L Yang, S Lin, G Wang
arXiv preprint arXiv:2001.04520, 2020
52020
Towards the adoption of anti-spoofing protocols
H Hu, P Peng, G Wang
arXiv preprint arXiv:1711.06654, 2017
32017
Characterizing and Detecting Online Deception via Data-Driven Methods
H Hu
Virginia Tech, 2020
12020
Journal: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2020, № 4, p. 1-21
FH Shezan, H Hu, G Wang, Y Tian
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2020
2020
Towards the Adoption of Anti-spoofing Protocols for Email Systems.
H Hu, P Peng, G Wang
arXiv preprint arXiv:1711.06654, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–18