Login / Signup
Geng Hong
ORCID
Publication Activity (10 Years)
Years Active: 2018-2024
Publications (10 Years): 8
Top Topics
Real World
Simulation Study
Novice Users
Visual Search
Top Venues
CCS
IEEE Symposium on Security and Privacy
ACM TUR-C
WWW
</>
Publications
</>
Guoyi Ye
,
Geng Hong
,
Yuan Zhang
,
Min Yang
Interface Illusions: Uncovering the Rise of Visual Scams in Cryptocurrency Wallets.
WWW
(2024)
Guoyi Ye
,
Mengying Wu
,
Geng Hong
,
Min Yang
Revealing and Analyzing the Visual Scams of Cryptocurrency Wallets.
ACM TUR-C
(2023)
Geng Hong
,
Mengying Wu
,
Pei Chen
,
Xiaojing Liao
,
Guoyi Ye
,
Min Yang
Understanding and Detecting Abused Image Hosting Modules as Malicious Services.
CCS
(2023)
Zhenrui Zhang
,
Geng Hong
,
Xiang Li
,
Zhuoqun Fu
,
Jia Zhang
,
Mingxuan Liu
,
Chuhan Wang
,
Jianjun Chen
,
Baojun Liu
,
Haixin Duan
,
Chao Zhang
,
Min Yang
Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab)use in the Wild.
CCS
(2023)
Geng Hong
,
Zhemin Yang
,
Sen Yang
,
Xiaojing Liao
,
Xiaolin Du
,
Min Yang
,
Haixin Duan
Analyzing Ground-Truth Data of Mobile Gambling Scams.
IEEE Symposium on Security and Privacy
(2022)
Hao Xia
,
Yuan Zhang
,
Yingtian Zhou
,
Xiaoting Chen
,
Yang Wang
,
Xiangyu Zhang
,
Shuaishuai Cui
,
Geng Hong
,
Xiaohan Zhang
,
Min Yang
,
Zhemin Yang
How Android developers handle evolution-induced API compatibility issues: a large-scale study.
ICSE
(2020)
Geng Hong
,
Zhemin Yang
,
Sen Yang
,
Lei Zhang
,
Yuhong Nan
,
Zhibo Zhang
,
Min Yang
,
Yuan Zhang
,
Zhiyun Qian
,
Hai-Xin Duan
How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World.
CCS
(2018)
Lei Zhang
,
Zhemin Yang
,
Yuyu He
,
Zhenyu Zhang
,
Zhiyun Qian
,
Geng Hong
,
Yuan Zhang
,
Min Yang
Invetter: Locating Insecure Input Validations in Android Services.
CCS
(2018)