
Haining Wang
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2021
- [j61]Xing Gao
, Benjamin Steenkamer
, Zhongshu Gu, Mehmet Kayaalp, Dimitrios Pendarakis, Haining Wang
:
A Study on the Security Implications of Information Leakages in Container Clouds. IEEE Trans. Dependable Secur. Comput. 18(1): 174-191 (2021) - 2020
- [j60]Zhiwei Xie, Yandong Chen
, Wenhua Wu, Yuancan Xu, Haining Wang, Jian Guo, An Luo:
Modeling and Control Parameters Design for Grid-Connected Inverter System Considering the Effect of PLL and Grid Impedance. IEEE Access 8: 40474-40484 (2020) - [j59]Yue Wang, Ray Forbes, Uri Elzur, John Strassner, Antonio Gamelas, Haining Wang, Shucheng Liu, Luca Pesando, Xiangfeng Yuan, Shengming Cai:
From Design to Practice: ETSI ENI Reference Architecture and Instantiation for Network Management and Orchestration Using Artificial Intelligence. IEEE Commun. Stand. Mag. 4(3): 38-45 (2020) - [j58]Jinke Song, Qiang Li
, Haining Wang, Limin Sun:
Under the Concealing Surface: Detecting and Understanding Live Webcams in the Wild. Proc. ACM Meas. Anal. Comput. Syst. 4(1): 05:1-05:25 (2020) - [j57]Yubao Zhang
, Jidong Xiao
, Shuai Hao
, Haining Wang
, Sencun Zhu
, Sushil Jajodia
:
Understanding the Manipulation on Recommender Systems through Web Injection. IEEE Trans. Inf. Forensics Secur. 15: 3807-3818 (2020) - [j56]Gaoxiang Li
, Yandong Chen
, An Luo, Haining Wang
:
An Enhancing Grid Stiffness Control Strategy of STATCOM/BESS for Damping Sub-Synchronous Resonance in Wind Farm Connected to Weak Grid. IEEE Trans. Ind. Informatics 16(9): 5835-5845 (2020) - [c131]Kun Du, Hao Yang, Yubao Zhang, Haixin Duan, Haining Wang, Shuang Hao, Zhou Li, Min Yang:
Understanding Promotion-as-a-Service on GitHub. ACSAC 2020: 597-610 - [c130]Yubao Zhang, Shuai Hao, Haining Wang:
Review Trade: Everything Is Free in Incentivized Review Groups. SecureComm (1) 2020: 339-359 - [c129]Jinke Song, Qiang Li, Haining Wang, Limin Sun:
Under the Concealing Surface: Detecting and Understanding Live Webcams in the Wild. SIGMETRICS (Abstracts) 2020: 77-78 - [c128]Zhihao Wang, Qiang Li
, Jinke Song, Haining Wang, Limin Sun:
Towards IP-based Geolocation via Fine-grained and Stable Webcam Landmarks. WWW 2020: 1422-1432
2010 – 2019
- 2019
- [j55]Zhanyu Ma
, Yifeng Ding, Shaoguo Wen, Jiyang Xie, Yifeng Jin, Zhongwei Si
, Haining Wang:
Shoe-Print Image Retrieval With Multi-Part Weighted CNN. IEEE Access 7: 59728-59736 (2019) - [j54]Rui Bian, Shuai Hao, Haining Wang, Amogh Dhamdhere, Alberto Dainotti, Chase Cotton:
Towards passive analysis of anycast in global routing: unintended impact of remote peering. Comput. Commun. Rev. 49(3): 18-25 (2019) - [j53]Yue Li, Haining Wang, Kun Sun:
BluePass: A Mobile Device Assisted Password Manager. EAI Endorsed Trans. Security Safety 5(17): e3 (2019) - [j52]Yang Song, Chen Wu, Sencun Zhu, Haining Wang:
A Machine Learning Based Approach for Mobile App Rating Manipulation Detection. EAI Endorsed Trans. Security Safety 5(18): e3 (2019) - [c127]Hao Yang, Kun Du, Yubao Zhang, Shuang Hao, Zhou Li
, Mingxuan Liu, Haining Wang, Hai-Xin Duan, Yazhou Shi, XiaoDong Su, Guang Liu, Zhifeng Geng, Jianping Wu:
Casino royale: a deep exploration of illegal online gambling. ACSAC 2019: 500-513 - [c126]Rebekah Houser, Zhou Li
, Chase Cotton, Haining Wang:
An investigation on information leakage of DNS over TLS. CoNEXT 2019: 123-137 - [c125]Haining Wang, Jimmy Huang, Zhewei Zhang:
The Impact of Deep Learning on Organizational Agility. ICIS 2019 - [c124]Lin Jin, Shuai Hao, Haining Wang, Chase Cotton:
Unveil the Hidden Presence: Characterizing the Backend Interface of Content Delivery Networks. ICNP 2019: 1-11 - [c123]Xuan Feng, Xiaojing Liao, XiaoFeng Wang, Haining Wang, Qiang Li, Kai Yang, Hongsong Zhu, Limin Sun:
Understanding and Securing Device Vulnerabilities through Automated Bug Report Analysis. USENIX Security Symposium 2019: 887-903 - 2018
- [j51]Yue Wang, Ray Forbes, Chris Cavigioli, Haining Wang, Antonio Gamelas, Archie Wade, John Strassner, Shengming Cai, Shucheng Liu:
Network Management and Orchestration Using Artificial Intelligence: Overview of ETSI ENI. IEEE Commun. Stand. Mag. 2(4): 58-65 (2018) - [j50]Qiang Li
, Xuan Feng, Haining Wang
, Limin Sun:
Understanding the Usage of Industrial Control System Devices on the Internet. IEEE Internet Things J. 5(3): 2178-2189 (2018) - [j49]Fengwei Zhang
, Kevin Leach, Angelos Stavrou
, Haining Wang:
Towards Transparent Debugging. IEEE Trans. Dependable Secur. Comput. 15(2): 321-335 (2018) - [c122]Zi Chu, Steven Gianvecchio, Haining Wang:
Bot or Human? A Behavior-Based Online Bot Detection System. From Database to Cyber Security 2018: 432-449 - [c121]Daiping Liu, Mingwei Zhang, Haining Wang:
A Robust and Efficient Defense against Use-after-Free Exploits via Concurrent Pointer Sweeping. CCS 2018: 1635-1648 - [c120]Lin Jin, Shuai Hao, Haining Wang, Chase Cotton:
Your Remnant Tells Secret: Residual Resolution in DDoS Protection Services. DSN 2018: 362-373 - [c119]Haitao Xu, Zhao Li, Chen Chu, Yuanmi Chen, Yifan Yang, Haifeng Lu, Haining Wang, Angelos Stavrou:
Detecting and Characterizing Web Bot Traffic in a Large E-commerce Marketplace. ESORICS (2) 2018: 143-163 - [c118]Haining Wang, Wanrong Chen, Yi Li, Yang Yu, Wenxiu Yang, Roger Ball:
A 3D Head Model Fitting Method Using Chinese Head Anthropometric Data. HCI (11) 2018: 203-215 - [c117]Haining Wang, Yang Yu, Wanrong Chen, Wenxiu Yang, Roger Ball:
Responsive Web Design for Chinese Head and Facial Database. HCI (11) 2018: 216-231 - [c116]Qiang Li
, Xuan Feng, Haining Wang, Limin Sun:
Discovery of Internet of Thing devices based on rules. INFOCOM Workshops 2018: 1-2 - [c115]Yue Li, Haining Wang, Kun Sun
:
Email as a Master Key: Analyzing Account Recovery in the Wild. INFOCOM 2018: 1646-1654 - [c114]Haitao Xu, Shuai Hao, Alparslan Sari
, Haining Wang:
Privacy Risk Assessment on Email Tracking. INFOCOM 2018: 2519-2527 - [c113]Qiang Li
, Xuan Feng, Haining Wang, Zhi Li, Limin Sun:
Towards Fine-grained Fingerprinting of Firmware in Online Embedded Devices. INFOCOM 2018: 2537-2545 - [c112]Xing Gao, Zhang Xu, Haining Wang, Li Li, Xiaorui Wang:
Reduced Cooling Redundancy: A New Security Vulnerability in a Hot Data Center. NDSS 2018 - [c111]Xuan Feng, Qiang Li, Haining Wang, Limin Sun:
Acquisitional Rule-based Engine for Discovering Internet-of-Thing Devices. USENIX Security Symposium 2018: 327-341 - [c110]Shuai Hao, Yubao Zhang, Haining Wang, Angelos Stavrou
:
End-Users Get Maneuvered: Empirical Analysis of Redirection Hijacking in Content Delivery Networks. USENIX Security Symposium 2018: 1129-1145 - 2017
- [j48]Shuai Hao, Haining Wang:
Exploring Domain Name Based Features on the Effectiveness of DNS Caching. Comput. Commun. Rev. 47(1): 36-42 (2017) - [j47]Nicolas Van Balen, Christopher T. Ball, Haining Wang:
Analysis of Targeted Mouse Movements for Gender Classification. EAI Endorsed Trans. Security Safety 4(11): e3 (2017) - [j46]Yubao Zhang
, Xin Ruan, Haining Wang
, Hui Wang, Su He:
Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending. IEEE Trans. Inf. Forensics Secur. 12(1): 144-156 (2017) - [j45]Yue Li
, Haining Wang, Kun Sun:
Personal Information in Passwords and Its Security Implications. IEEE Trans. Inf. Forensics Secur. 12(10): 2320-2333 (2017) - [j44]Haitao Xu, Daiping Liu, Haining Wang, Angelos Stavrou:
An Empirical Investigation of Ecommerce-Reputation-Escalation-as-a-Service. ACM Trans. Web 11(2): 13:1-13:35 (2017) - [c109]Daiping Liu, Zhou Li
, Kun Du, Haining Wang, Baojun Liu, Hai-Xin Duan:
Don't Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains. CCS 2017: 537-552 - [c108]Xing Gao, Zhongshu Gu, Mehmet Kayaalp, Dimitrios Pendarakis, Haining Wang:
ContainerLeaks: Emerging Security Threats of Information Leakages in Container Clouds. DSN 2017: 237-248 - [c107]Daiping Liu, Xing Gao, Mingwei Zhang, Haining Wang, Angelos Stavrou:
Detecting Passive Cheats in Online Games via Performance-Skillfulness Inconsistency. DSN 2017: 615-626 - [c106]Haining Wang, Priyesh Shetty, Zhi Ding
:
Low Complexity Node Clustering in Cloud-RAN for Service Provisioning and Resource Allocation. GLOBECOM 2017: 1-6 - [c105]Yue Li, Nan Zheng, Haining Wang, Kun Sun, Hui Fang:
A measurement study on Amazon wishlist and its privacy exposure. ICC 2017: 1-7 - [c104]Xing Gao, Dachuan Liu, Daiping Liu, Haining Wang, Angelos Stavrou:
E-Android: A New Energy Profiling Tool for Smartphones. ICDCS 2017: 492-502 - [c103]Dachuan Liu, Xing Gao, Haining Wang:
Location Privacy Breach: Apps Are Watching You in Background. ICDCS 2017: 2423-2429 - [c102]Qiang Li
, Xuan Feng, Haining Wang, Limin Sun:
Automatically Discovering Surveillance Devices in the Cyberspace. MMSys 2017: 331-342 - [c101]Yue Li, Haining Wang, Kun Sun:
BluePass: A Secure Hand-Free Password Manager. SecureComm 2017: 185-205 - [c100]Xing Gao, Zhang Xu, Haining Wang, Li Li, Xiaorui Wang:
Why "Some" Like It Hot Too: Thermal Attack on Data Centers. SIGMETRICS (Abstracts) 2017: 23-24 - 2016
- [j43]Xin Ruan, Zhenyu Wu, Haining Wang, Sushil Jajodia
:
Profiling Online Social Behaviors for Compromised Account Detection. IEEE Trans. Inf. Forensics Secur. 11(1): 176-187 (2016) - [j42]Nan Zheng, Aaron Paloski, Haining Wang:
An Efficient User Verification System Using Angle-Based Mouse Movement Biometrics. ACM Trans. Inf. Syst. Secur. 18(3): 11:1-11:27 (2016) - [j41]Zhen Ren, Xin Qi, Gang Zhou, Haining Wang, David T. Nguyen:
Throughput Assurance for Multiple Body Sensor Networks. IEEE Trans. Parallel Distributed Syst. 27(2): 546-557 (2016) - [j40]Haining Wang, Chenxi Zhu, Zhi Ding
:
Femtocell Power Control for Interference Management Based on Macrolayer Feedback. IEEE Trans. Veh. Technol. 65(7): 5222-5236 (2016) - [j39]Dachuan Liu
, Haining Wang, Gang Zhou, Weizhen Mao, Boyang Li:
Arbitrating Traffic Contention for Power Saving with Multiple PSM Clients. IEEE Trans. Wirel. Commun. 15(10): 7030-7043 (2016) - [c99]Zhang Xu, Zhenyu Wu, Zhichun Li, Kangkook Jee, Junghwan Rhee, Xusheng Xiao
, Fengyuan Xu, Haining Wang, Guofei Jiang:
High Fidelity Data Reduction for Big Data Security Dependency Analyses. CCS 2016: 504-516 - [c98]Daiping Liu, Shuai Hao, Haining Wang:
All Your DNS Records Point to Us: Understanding the Security Threats of Dangling DNS Records. CCS 2016: 1414-1425 - [c97]Xing Gao, Dachuan Liu, Daiping Liu, Haining Wang:
On Energy Security of Smartphones. CODASPY 2016: 148-150 - [c96]Jidong Xiao, Lei Lu, Haining Wang, Xiaoyun Zhu:
HyperLink: Virtual Machine Introspection and Memory Forensic Analysis without Kernel Source Code. ICAC 2016: 127-136 - [c95]Haining Wang, Zhi Ding
:
Joint power and rate optimization for co-channel small cells using Frank-Wolfe algorithm. ICC 2016: 1-6 - [c94]Xuan Feng, Qiang Li, Haining Wang, Limin Sun:
Characterizing industrial control system devices on the Internet. ICNP 2016: 1-10 - [c93]Xuan Feng, Qiang Li, Haining Wang, Limin Sun:
ASCEND: A search engine for online industrial control devices. ICNP 2016: 1-2 - [c92]Qiang Li, Xuan Feng, Zhi Li, Haining Wang, Limin Sun:
GUIDE: Graphical user interface fingerprints physical devices. ICNP 2016: 1-2 - [c91]Yue Li, Haining Wang, Kun Sun:
A study of personal information in human-chosen passwords and its security implications. INFOCOM 2016: 1-9 - [c90]Aaron Koehl, Haining Wang:
SERF: optimization of socially sourced images using psychovisual enhancements. MMSys 2016: 16:1-16:12 - [c89]Nicolas Van Balen, Christopher T. Ball, Haining Wang:
A Behavioral Biometrics Based Approach to Online Gender Classification. SecureComm 2016: 475-495 - [c88]Daiping Liu, Xing Gao, Mingwei Zhang, Haining Wang:
Shoot for the Moon and You Will Never Miss: Characterizing and Detecting Aimbots in Online Games. SIGMETRICS 2016: 401-402 - [c87]Jidong Xiao, Lei Lu, Hai Huang, Haining Wang:
Hyperprobe: Towards Virtual Machine Extrospection. USENIX Annual Technical Conference 2016 - 2015
- [j38]Gang Lu, Jianfeng Zhan, Haining Wang, Lin Yuan, Yunwei Gao, Chuliang Weng, Yong Qi:
PowerTracer: Tracing Requests in Multi-Tier Services to Reduce Energy Inefficiency. IEEE Trans. Computers 64(5): 1389-1401 (2015) - [j37]Zhenyu Wu, Zhang Xu, Haining Wang:
Whispers in the Hyper-Space: High-Bandwidth and Reliable Covert Channel Attacks Inside the Cloud. IEEE/ACM Trans. Netw. 23(2): 603-615 (2015) - [j36]Haining Wang, Zhi Ding
:
Power Control and Resource Allocation for Outage Balancing in Femtocell Networks. IEEE Trans. Wirel. Commun. 14(4): 2043-2057 (2015) - [j35]Haining Wang, Jiaheng Wang, Zhi Ding
:
Distributed Power Control in a Two-Tier Heterogeneous Network. IEEE Trans. Wirel. Commun. 14(12): 6509-6523 (2015) - [c86]Dachuan Liu, Bo Dong, Xing Gao, Haining Wang:
Exploiting Eye Tracking for Smartphone Authentication. ACNS 2015: 457-477 - [c85]Fengwei Zhang, Kevin Leach, Haining Wang, Angelos Stavrou
:
TrustLogin: Securing Password-Login on Commodity Operating Systems. AsiaCCS 2015: 333-344 - [c84]He Sun, Kun Sun, Yuewu Wang, Jiwu Jing, Haining Wang:
TrustICE: Hardware-Assisted Isolated Computing Environments on Mobile Devices. DSN 2015: 367-378 - [c83]Shuai Hao, Haining Wang, Angelos Stavrou
, Evgenia Smirni:
On the DNS Deployment of Modern Web Services. ICNP 2015: 100-110 - [c82]Jidong Xiao, Lei Lu, Hai Huang, Haining Wang:
Hyperprobe: Towards Virtual Machine Extrospection. LISA 2015: 1-12 - [c81]Haitao Xu, Haining Wang, Angelos Stavrou
:
Privacy Risk Assessment on Online Photos. RAID 2015: 427-447 - [c80]Jidong Xiao, Hai Huang, Haining Wang:
Defeating Kernel Driver Purifier. SecureComm 2015: 116-134 - [c79]Jidong Xiao, Hai Huang, Haining Wang:
Kernel Data Attack Is a Realistic Security Threat. SecureComm 2015: 135-154 - [c78]Fengwei Zhang, Kevin Leach, Angelos Stavrou
, Haining Wang, Kun Sun
:
Using Hardware Features for Increased Debugging Transparency. IEEE Symposium on Security and Privacy 2015: 55-69 - [c77]Xing Gao, Dachuan Liu, Haining Wang, Kun Sun:
PmDroid: Permission Supervision for Android Advertising. SRDS 2015: 120-129 - [c76]Zhang Xu, Haining Wang, Zhenyu Wu:
A Measurement Study on Co-residence Threat inside the Cloud. USENIX Security Symposium 2015: 929-944 - [c75]Haitao Xu, Daiping Liu, Haining Wang, Angelos Stavrou
:
E-commerce Reputation Manipulation: The Emergence of Reputation-Escalation-as-a-Service. WWW 2015: 1296-1306 - 2014
- [j34]Zhen Ren, Xin Qi, Gang Zhou, Haining Wang:
Exploiting the Data Sensitivity of Neurometric Fidelity for Optimizing EEG Sensing. IEEE Internet Things J. 1(3): 243-254 (2014) - [j33]Haining Wang, Zhi Ding
:
Macrocell-Queue-Stabilization-Based Power Control of Femtocell Networks. IEEE Trans. Wirel. Commun. 13(9): 5223-5236 (2014) - [c74]Brett Cooley, Haining Wang, Angelos Stavrou
:
Activity Spoofing and Its Defense in Android Smartphones. ACNS 2014: 494-512 - [c73]Duy Le, Jidong Xiao, Hai Huang, Haining Wang:
Shadow patching: Minimizing maintenance windows in a virtualized enterprise environment. CNSM 2014: 169-174 - [c72]Hemant Sengar, Haining Wang, Seyed Amir Iranmanesh:
Wiretap-proof: what they hear is not what you speak, and what you speak they do not hear. CODASPY 2014: 345-356 - [c71]Daiping Liu, Haining Wang, Angelos Stavrou
:
Detecting Malicious Javascript in PDF through Document Instrumentation. DSN 2014: 100-111 - [c70]Fengwei Zhang, Haining Wang, Kevin Leach, Angelos Stavrou
:
A Framework to Secure Peripherals at Runtime. ESORICS (1) 2014: 219-238 - [c69]Haitao Xu, Daiping Liu, Aaron Koehl, Haining Wang, Angelos Stavrou
:
Click Fraud Detection on the Advertiser Side. ESORICS (2) 2014: 419-438 - [c68]Haining Wang, Zhi Ding
:
Power control and rate allocation for outage balancing in femtocell networks. GLOBECOM 2014: 4257-4262 - [c67]Nan Zheng, Kun Bai, Hai Huang, Haining Wang:
You Are How You Touch: User Verification on Smartphones via Tapping Behaviors. ICNP 2014: 221-232 - [c66]Yubao Zhang, Xin Ruan, Haining Wang, Hui Wang:
What scale of audience a campaign can reach in what price on Twitter? INFOCOM 2014: 1168-1176 - [c65]Zhang Xu, Haining Wang, Zichen Xu, Xiaorui Wang:
Power Attack: An Increasing Threat to Data Centers. NDSS 2014 - [c64]Nicolas Van Balen, Haining Wang:
GridMap: Enhanced Security in Cued-Recall Graphical Passwords. SecureComm (1) 2014: 75-94 - [c63]Zhang Xu, Haining Wang, Sushil Jajodia
:
Gemini: An Emergency Line of Defense against Phishing Attacks. SRDS 2014: 11-20 - 2013
- [j32]Zi Chu, Steven Gianvecchio, Aaron Koehl, Haining Wang, Sushil Jajodia
:
Blog or block: Detecting blog bots through behavioral biometrics. Comput. Networks 57(3): 634-646 (2013) - [j31]Zhenyu Wu, Yueping Zhang, Vishal K. Singh, Guofei Jiang, Haining Wang:
Automating Cloud Network Optimization and Evolution. IEEE J. Sel. Areas Commun. 31(12): 2620-2631 (2013) - [j30]Michal Cierny, Haining Wang, Risto Wichman, Zhi Ding
, Carl Wijting:
On Number of Almost Blank Subframes in Heterogeneous Cellular Networks. IEEE Trans. Wirel. Commun. 12(10): 5061-5073 (2013) - [j29]Chuan Yue, Haining Wang:
A measurement study of insecure javascript practices on the web. ACM Trans. Web 7(2): 7:1-7:39 (2013) - [c62]Jing Jin, Jeff Offutt, Nan Zheng, Feng Mao, Aaron Koehl, Haining Wang:
Evasive bots masquerading as human beings on the web. DSN 2013: 1-12 - [c61]Jidong Xiao, Zhang Xu, Hai Huang, Haining Wang:
Security implications of memory deduplication in a virtualized environment. DSN 2013: 1-12 - [c60]Haining Wang, Zhi Ding
, Michal Cierny, Risto Wichman:
Time domain bi-level downlink power control for cross-tier interference mitigation in HetNet. ICC 2013: 5183-5187 - [c59]Xin Ruan, Chuan Yue, Haining Wang:
Unveiling Privacy Setting Breaches in Online Social Networks. SecureComm 2013: 323-341 - [c58]Kun-Yu Wang, Haining Wang, Zhi Ding
, Chong-Yung Chi:
A Low-Complexity Algorithm for Worst-Case Utility Maximization in Multiuser MISO Downlink. VTC Fall 2013: 1-5 - [i3]Kun-Yu Wang, Haining Wang, Zhi Ding, Chong-Yung Chi:
Low-Complexity Algorithm for Worst-Case Utility Maximization in Multiuser MISO Downlink. CoRR abs/1302.5975 (2013) - [i2]Michal Cierny, Haining Wang, Risto Wichman, Zhi Ding, Carl Wijting:
On Number of Almost Blank Subframes in Heterogeneous Cellular Networks. CoRR abs/1304.2269 (2013) - 2012
- [j28]Mengjun Xie, Zhenyu Wu, Haining Wang:
Secure instant messaging in enterprise-like networks. Comput. Networks 56(1): 448-461 (2012) - [j27]Zi Chu, Steven Gianvecchio, Haining Wang, Sushil Jajodia
:
Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg? IEEE Trans. Dependable Secur. Comput. 9(6): 811-824 (2012) - [j26]Zhenyu Wu, Mengjun Xie, Haining Wang:
On Energy Security of Server Systems. IEEE Trans. Dependable Secur. Comput. 9(6): 865-876 (2012) - [j25]Bo Sang, Jianfeng Zhan, Gang Lu, Haining Wang, Dongyan Xu, Lei Wang, Zhihong Zhang, Zhen Jia:
Precise, Scalable, and Online Request Tracing for Multitier Services of Black Boxes. IEEE Trans. Parallel Distributed Syst. 23(6): 1159-1167 (2012) - [c57]Zi Chu, Indra Widjaja, Haining Wang:
Detecting Social Spam Campaigns on Twitter. ACNS 2012: 455-472 - [c56]Jidong Xiao, Zhang Xu, Hai Huang, Haining Wang:
A covert channel construction in a virtualized environment. CCS 2012: 1040-1042 - [c55]Duy Le, Hai Huang, Haining Wang:
Understanding performance implications of nested file systems in a virtualized environment. FAST 2012: 8 - [c54]Gang Lu, Jianfeng Zhan, Haining Wang, Lin Yuan, Chuliang Weng:
PowerTracer: tracing requests in multi-tier services to diagnose energy inefficiency. ICAC 2012: 97-102 - [c53]Mengjun Xie, Indra Widjaja, Haining Wang:
Enhancing cache robustness for content-centric networking. INFOCOM 2012: 2426-2434 - [c52]Zhenyu Wu, Yueping Zhang, Vishal K. Singh, Guofei Jiang, Haining Wang:
NetDEO: Automating network design, evolution, and optimization. IWQoS 2012: 1-9 - [c51]Aaron Koehl, Haining Wang:
m.Site: Efficient Content Adaptation for Mobile Devices. Middleware 2012: 41-60 - [c50]Seyed Amir Iranmanesh, Hemant Sengar, Haining Wang:
A Voice Spam Filter to Clean Subscribers' Mailbox. SecureComm 2012: 349-367 - [c49]Zhenyu Wu, Zhang Xu, Haining Wang:
Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud. USENIX Security Symposium 2012: 159-173 - [c48]Aaron Koehl, Haining Wang:
Surviving a search engine overload. WWW 2012: 171-180 - [e2]Muttukrishnan Rajarajan, Fred Piper, Haining Wang, George Kesidis:
Security and Privacy in Communication Networks - 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 96, Springer 2012, ISBN 978-3-642-31908-2