How you get shot in the back: A systematical study about cryptojacking in the real world G Hong, Z Yang, S Yang, L Zhang, Y Nan, Z Zhang, M Yang, Y Zhang, ... Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 151 | 2018 |
How Android developers handle evolution-induced API compatibility issues: a large-scale study H Xia, Y Zhang, Y Zhou, X Chen, Y Wang, X Zhang, S Cui, G Hong, ... Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020 | 46* | 2020 |
Invetter: Locating insecure input validations in android services L Zhang, Z Yang, Y He, Z Zhang, Z Qian, G Hong, Y Zhang, M Yang Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 27 | 2018 |
Analyzing ground-truth data of mobile gambling scams G Hong, Z Yang, S Yang, X Liaoy, X Du, M Yang, H Duan 2022 IEEE Symposium on Security and Privacy (SP), 2176-2193, 2022 | 19 | 2022 |
Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab) use in the Wild Z Zhang, G Hong, X Li, Z Fu, J Zhang, M Liu, C Wang, J Chen, B Liu, ... Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 1 | 2023 |
Interface Illusions: Uncovering the Rise of Visual Scams in Cryptocurrency Wallets G Ye, G Hong, Y Zhang, M Yang Proceedings of the ACM on Web Conference 2024, 1585-1595, 2024 | | 2024 |
Understanding and Detecting Abused Image Hosting Modules as Malicious Services G Hong, M Wu, P Chen, X Liao, G Ye, M Yang Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | | 2023 |
Revealing and Analyzing the Visual Scams of Cryptocurrency Wallets G Ye, M Wu, G Hong, M Yang Proceedings of the ACM Turing Award Celebration Conference-China 2023, 148-149, 2023 | | 2023 |
Detection and Analysis Technology of Cybercrime G Hong, S Yang, H Ye, Z Yang, M Yang Journal of Computer Research and Development 58 (10), 2120, 2021 | | 2021 |