C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Hang Hu
Publication Activity (10 Years)
Years Active: 2017-2021
Publications (10 Years): 15
Top Topics
Interactive Voice Response
Email
Phishing Attacks
Spam Filtering
Top Venues
CoRR
USENIX Security Symposium
IEEE Symposium on Security and Privacy
AsiaCCS
</>
Publications
</>
Hang Hu
,
Steve T. K. Jan
,
Yang Wang
,
Gang Wang
Assessing Browser-level Defense against IDN-based Phishing.
USENIX Security Symposium
(2021)
Faysal Hossain Shezan
,
Hang Hu
,
Gang Wang
,
Yuan Tian
VerHealth: Vetting Medical Voice Applications through Policy Enforcement.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol.
4 (4) (2020)
Faysal Hossain Shezan
,
Hang Hu
,
Jiamin Wang
,
Gang Wang
,
Yuan Tian
Read Between the Lines: An Empirical Measurement of Sensitive Applications of Voice Personal Assistant Systems.
WWW
(2020)
Hang Hu
,
Limin Yang
,
Shihan Lin
,
Gang Wang
Security Vetting Process of Smart-home Assistant Applications: A First Look and Case Studies.
CoRR
(2020)
Hang Hu
,
Limin Yang
,
Shihan Lin
,
Gang Wang
A Case Study of the Security Vetting Process of Smart-home Assistant Applications.
SP Workshops
(2020)
Peng Peng
,
Chao Xu
,
Luke Quinn
,
Hang Hu
,
Bimal Viswanath
,
Gang Wang
What Happens After You Leak Your Password: Understanding Credential Sharing on Phishing Sites.
AsiaCCS
(2019)
Hang Hu
,
Peng Peng
,
Gang Wang
Characterizing Pixel Tracking through the Lens of Disposable Email Services.
IEEE Symposium on Security and Privacy
(2019)
Chun Wang
,
Steve T. K. Jan
,
Hang Hu
,
Douglas Bossart
,
Gang Wang
The Next Domino to Fall: Empirical Analysis of User Passwords across Online Services.
CODASPY
(2018)
Hang Hu
,
Gang Wang
Revisiting Email Spoofing Attacks.
CoRR
(2018)
Ke Tian
,
Steve T. K. Jan
,
Hang Hu
,
Danfeng Yao
,
Gang Wang
Needle in a Haystack: Tracking Down Elite Phishing Domains in the Wild.
Internet Measurement Conference
(2018)
Hang Hu
,
Gang Wang
End-to-End Measurements of Email Spoofing Attacks.
USENIX Security Symposium
(2018)
Dongliang Mu
,
Alejandro Cuevas
,
Limin Yang
,
Hang Hu
,
Xinyu Xing
,
Bing Mao
,
Gang Wang
Understanding the Reproducibility of Crowd-reported Security Vulnerabilities.
USENIX Security Symposium
(2018)
Hang Hu
,
Peng Peng
,
Gang Wang
Towards Understanding the Adoption of Anti-Spoofing Protocols in Email Systems.
SecDev
(2018)
Hang Hu
,
Peng Peng
,
Gang Wang
Towards the Adoption of Anti-spoofing Protocols for Email Systems.
CoRR
(2017)
Chun Wang
,
Steve T. K. Jan
,
Hang Hu
,
Gang Wang
Empirical Analysis of Password Reuse and Modification across Online Service.
CoRR
(2017)