Author pages are created from data sourced from our academic publisher partnerships and public sources.
- Publications
- Influence
Share This Author
Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg?
- Zi Chu, Steven Gianvecchio, Haining Wang, S. Jajodia
- Computer ScienceIEEE Transactions on Dependable and Secure…
- 1 November 2012
TLDR
Detecting SYN flooding attacks
- Haining Wang, Danlu Zhang, K. Shin
- Computer ScienceProceedings.Twenty-First Annual Joint Conference…
- 23 June 2002
TLDR
Who is tweeting on Twitter: human, bot, or cyborg?
- Zi Chu, Steven Gianvecchio, Haining Wang, S. Jajodia
- Computer ScienceACSAC '10
- 6 December 2010
TLDR
Hop-count filtering: an effective defense against spoofed DDoS traffic
- Cheng Jin, Haining Wang, K. Shin
- Computer ScienceCCS '03
- 27 October 2003
TLDR
You Are How You Touch: User Verification on Smartphones via Tapping Behaviors
- Nan Zheng, Kun Bai, Hai Huang, Haining Wang
- Computer ScienceIEEE 22nd International Conference on Network…
- 21 October 2014
TLDR
An efficient user verification system via mouse movements
- Nan Zheng, Aaron Paloski, Haining Wang
- Computer ScienceCCS '11
- 17 October 2011
TLDR
Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud
- Zhenyu Wu, Zhang Xu, Haining Wang
- Computer ScienceUSENIX Security Symposium
- 8 August 2012
TLDR
Detecting covert timing channels: an entropy-based approach
- Steven Gianvecchio, Haining Wang
- Computer ScienceCCS '07
- 28 October 2007
TLDR
High Fidelity Data Reduction for Big Data Security Dependency Analyses
TLDR
Defense Against Spoofed IP Traffic Using Hop-Count Filtering
- Haining Wang, Cheng Jin, K. Shin
- Computer ScienceIEEE/ACM Transactions on Networking
- 1 February 2007
TLDR
...
...