Follow
Geng Hong
Geng Hong
Verified email at fudan.edu.cn
Title
Cited by
Cited by
Year
How you get shot in the back: A systematical study about cryptojacking in the real world
G Hong, Z Yang, S Yang, L Zhang, Y Nan, Z Zhang, M Yang, Y Zhang, ...
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1512018
How Android developers handle evolution-induced API compatibility issues: a large-scale study
H Xia, Y Zhang, Y Zhou, X Chen, Y Wang, X Zhang, S Cui, G Hong, ...
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
46*2020
Invetter: Locating insecure input validations in android services
L Zhang, Z Yang, Y He, Z Zhang, Z Qian, G Hong, Y Zhang, M Yang
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
272018
Analyzing ground-truth data of mobile gambling scams
G Hong, Z Yang, S Yang, X Liaoy, X Du, M Yang, H Duan
2022 IEEE Symposium on Security and Privacy (SP), 2176-2193, 2022
192022
Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab) use in the Wild
Z Zhang, G Hong, X Li, Z Fu, J Zhang, M Liu, C Wang, J Chen, B Liu, ...
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
12023
Interface Illusions: Uncovering the Rise of Visual Scams in Cryptocurrency Wallets
G Ye, G Hong, Y Zhang, M Yang
Proceedings of the ACM on Web Conference 2024, 1585-1595, 2024
2024
Understanding and Detecting Abused Image Hosting Modules as Malicious Services
G Hong, M Wu, P Chen, X Liao, G Ye, M Yang
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
2023
Revealing and Analyzing the Visual Scams of Cryptocurrency Wallets
G Ye, M Wu, G Hong, M Yang
Proceedings of the ACM Turing Award Celebration Conference-China 2023, 148-149, 2023
2023
Detection and Analysis Technology of Cybercrime
G Hong, S Yang, H Ye, Z Yang, M Yang
Journal of Computer Research and Development 58 (10), 2120, 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–9