Haining Wang
Haining Wang
Professor of ECE, University of Delaware
Verified email at udel.edu
TitleCited byYear
Detecting SYN flooding attacks
H Wang, D Zhang, KG Shin
Proceedings. Twenty-First Annual Joint Conference of the IEEE Computer and …, 2002
8722002
Hop-count filtering: an effective defense against spoofed DDoS traffic
C Jin, H Wang, KG Shin
Proceedings of the 10th ACM conference on Computer and communications …, 2003
6372003
Who is tweeting on Twitter: human, bot, or cyborg?
Z Chu, S Gianvecchio, H Wang, S Jajodia
Proceedings of the 26th annual computer security applications conference, 21-30, 2010
4762010
Detecting automation of twitter accounts: Are you a human, bot, or cyborg?
Z Chu, S Gianvecchio, H Wang, S Jajodia
IEEE Transactions on Dependable and Secure Computing 9 (6), 811-824, 2012
3882012
Defense against spoofed IP traffic using hop-count filtering
H Wang, C Jin, KG Shin
IEEE/ACM Transactions on Networking (ToN) 15 (1), 40-53, 2007
3612007
Change-point monitoring for the detection of DoS attacks
H Wang, D Zhang, KG Shin
IEEE Transactions on dependable and secure computing 1 (4), 193-208, 2004
2972004
Whispers in the hyper-space: high-bandwidth and reliable covert channel attacks inside the cloud
Z Wu, Z Xu, H Wang
IEEE/ACM Transactions on Networking 23 (2), 603-615, 2014
2522014
Whispers in the hyper-space: high-bandwidth and reliable covert channel attacks inside the cloud
Z Wu, Z Xu, H Wang
IEEE/ACM Transactions on Networking 23 (2), 603-615, 2014
2522014
Detecting covert timing channels: an entropy-based approach
S Gianvecchio, H Wang
Proceedings of the 14th ACM conference on Computer and communications …, 2007
2152007
You are how you touch: User verification on smartphones via tapping behaviors
N Zheng, K Bai, H Huang, H Wang
2014 IEEE 22nd International Conference on Network Protocols, 221-232, 2014
2112014
An efficient user verification system via mouse movements
N Zheng, A Paloski, H Wang
Proceedings of the 18th ACM conference on Computer and communications …, 2011
2022011
Detecting VoIP floods using the Hellinger distance
H Sengar, H Wang, D Wijesekera, S Jajodia
IEEE transactions on parallel and distributed systems 19 (6), 794-805, 2008
1722008
Enhancing cache robustness for content-centric networking
M Xie, I Widjaja, H Wang
2012 Proceedings IEEE INFOCOM, 2426-2434, 2012
1352012
Model-based covert timing channels: Automated modeling and evasion
S Gianvecchio, H Wang, D Wijesekera, S Jajodia
International Workshop on Recent Advances in Intrusion Detection, 211-230, 2008
1282008
VoIP intrusion detection through interacting protocol state machines
H Sengar, D Wijesekera, H Wang, S Jajodia
International Conference on Dependable Systems and Networks (DSN'06), 393-402, 2006
1232006
Characterizing insecure javascript practices on the web
C Yue, H Wang
Proceedings of the 18th international conference on World wide web, 961-970, 2009
1202009
Detecting social spam campaigns on twitter
Z Chu, I Widjaja, H Wang
International Conference on Applied Cryptography and Network Security, 455-472, 2012
1182012
Design and analysis of sensing scheduling algorithms under partial coverage for object detection in sensor networks
S Ren, Q Li, H Wang, X Chen, X Zhang
IEEE Transactions on Parallel and Distributed Systems 18 (3), 334-350, 2007
1022007
Segment-based proxy caching for internet streaming media delivery
S Chen, H Wang, X Zhang, B Shen, S Wee
IEEE multimedia 12 (3), 59-67, 2005
982005
Syn-dog: Sniffing syn flooding sources
H Wang, D Zhang, KG Shin
Proceedings 22nd International Conference on Distributed Computing Systems …, 2002
962002
The system can't perform the operation now. Try again later.
Articles 1–20