Name
Affiliation
Papers
SHUANG HAO
Department of Computer Science and Technology, Tsinghua University, China
36
Collaborators
Citations 
PageRank 
125
94
14.07
Referers 
Referees 
References 
393
791
334
Search Limit
100791
Title
Citations
PageRank
Year
Don't Kick Over the Beehive: Attacks and Security Analysis on Zigbee.00.342022
Understanding and Detecting Mobile Ad Fraud Through the Lens of Invalid Traffic20.382021
Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks00.342021
Understanding Promotion-as-a-Service on GitHub.00.342020
Attributing and Detecting Fake Images Generated by Known GANs10.402020
Lies in the Air: Characterizing Fake-base-station Spam Ecosystem in China00.342020
CDN Backfired: Amplification Attacks Based on HTTP Range Requests10.352020
CDN Judo: Breaking the CDN DoS Protection with Itself30.402020
Talking with Familiar Strangers: An Empirical Study on HTTPS Context Confusion Attacks20.372020
Measuring and Analyzing Search Engine Poisoning of Linguistic Collisions00.342019
Casino royale: a deep exploration of illegal online gambling10.352019
TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-Scale DNS Analysis10.352019
An End-to-End, Large-Scale Measurement of DNS-over-Encryption: How Far Have We Come?40.432019
Tl;Dr Hazard: A Comprehensive Study Of Levelsquatting Scams00.342019
AUSERA: Large-Scale Automated Security Risk Assessment of Global Mobile Banking Apps.20.372018
Semantic Segmentation of Aerial Image Using Fully Convolutional Network.00.342018
Enumerating Active IPv6 Hosts for Large-Scale Security Scans via DNSSEC-Signed Reverse Zones20.392018
A Reexamination of Internationalized Domain Names: The Good, the Bad and the Ugly20.372018
Measuring Privacy Threats in China-Wide Mobile Networks.00.342018
Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach.260.802018
Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates.20.392018
Abusing CDNs for Fun and Profit: Security Issues in CDNs' Origin Validation10.362018
Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks.120.572018
Cloud repository as a malicious service: challenge, identification and implication.00.342018
Analysis of mobile learning as an innovation in higher education: a comparative study of three countries.00.342017
Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions.10.352017
Hardening Malware Detection Systems Against Cyber Maneuvers: An Adversarial Machine Learning Approach.00.342017
DIFUZE: Interface Aware Fuzzing for Kernel Drivers.50.432017
On the Privacy and Security of the Ultrasound Ecosystem.30.482017
Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service.30.372016
Characterizing Long-tail SEO Spam on Cloud Web Hosting Services.90.502016
Probabilistic logical approach for testing diagnosability of stochastic discrete event systems.20.362016
Drops for Stuff: An Analysis of Reshipping Mule Scams60.502015
Highly survivable software defined synergistic IP+Optical Transport networks10.342014
A queue model to detect DDos attacks00.342005
Using trust for restricted delegation in grid environments20.412005