Exposing the Hidden Layer: Software Repositories in the Service of SEO Manipulation,
2024,
In Proceedings of the 47nd International Conference on Software Engineering (IEEE/ACM ICSE'25, CCF-A)
Mengying Wu, Geng Hong, Wuyuao Mai, Xinyi Wu, Lei Zhang, Yingyuan Pu, Huajun Chai, Lingyun Ying, Haixin Duan, and Min Yang
Revealing the black box of device search engine: scanning assets, strategies, and ethical consideration,
2024,
the Network and Distributed System Security (NDSS) Symposium 2025 (NDSS'25, CCF-A)
Mengying Wu, Geng Hong, Jinsong Chen, Qi Liu, Shujun Tang, Youhao Li, Baojun Liu, Haixin Duan, Min Yang
HADES Attack: Understanding and Evaluating Manipulation Risks of Email Blocklists,
2024,
the Network and Distributed System Security (NDSS) Symposium 2025 (NDSS'25, CCF-A)
Ruixuan Li, Chaoyi Lu, Baojun Liu, Yunyi Zhang, Geng Hong, Haixin Duan, Yanzhong Lin, Qingfeng Pan, Min Yang, Jun Shao
Misdirection of Trust: Demystifying the Abuse of Dedicated URL Shortening Service,
2024,
the Network and Distributed System Security (NDSS) Symposium 2025 (NDSS'25, CCF-A)
Zhibo Zhang, Lei Zhang, Zhangyue Zhang, Geng Hong, Yuan Zhang, Min Yang
Interface Illusions: Uncovering the Rise of Visual Scams in Cryptocurrency Wallets,
2024,
The Web Conference 2024 (ACM WWW 24, CCF-A)
Guoyi Ye, Geng Hong, Yuan Zhang, Min Yang
An Underground Industry Application Collection Method Based on Flow Analysis(一种基于突变流量的在野黑产应用采集方法),
2024,
Journal of Software(软件学报)
陈沛*,洪赓*,邬梦莹,陈晋松,段海新,杨珉
Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab)use in the Wild,
2023,
30th ACM SIGSAC Conference on Computer and Communications Security (ACM CCS'23, CCF-A)
Zhenrui Zhang*, Geng Hong*, Xiang Li, Zhuoqun Fu, Jia Zhang, Mingxuan Liu, Chuhan Wang, Jianjun Chen, Baojun Liu, Haixin Duan, Chao Zhang, Min Yang
Understanding and Detecting Abused Image Hosting Modules as Malicious Services,
2023,
30th ACM SIGSAC Conference on Computer and Communications Security (ACM CCS'23, CCF-A)
Geng Hong, Mengying Wu, Pei Chen, Xiaojing Liao, Guoyi Ye, Min Yang
Analyzing Ground-Truth Data of Mobile Gambling Scams,
2022,
43rd IEEE Symposium on Security and Privacy (IEEE S&P Oakland'22, CCF-A)
Geng Hong
,
Zhemin Yang, Sen Yang, Xiaojing Liao, Xiaolin Du, Min Yang and Haixin Duan
Detection and Analysis Technology of Cybercrime(网络犯罪的检测分析技术),
2021,
Journal of Computer Research and Development (计算机研究与发展)
洪赓,杨森,叶瀚,杨哲慜,杨珉
How Android Developers Handle Evolution-induced API Compatibility Issues: A Large-scale Study,
2020,
In Proceedings of the 42nd International Conference on Software Engineering (ACM ICSE'20, CCF-A)
Hao Xia, Yuan Zhang, Yingtian Zhou, Xiaoting Chen, Yang Wang, Xiangyu Zhang, Shuaishuai Cui, Geng Hong, Xiaohan Zhang, Min Yang and Zhemin Yang
How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World,
2018,
25th ACM SIGSAC Conference on Computer and Communications Security (ACM CCS'18, CCF-A)
Geng Hong
,
Zhemin Yang, Sen Yang, Lei Zhang, Yuhong Nan, Zhibo Zhang, Min Yang, Yuan Zhang, Zhiyun Qian and Haixin Duan
Invetter: Locating Insecure Input Validations in Android Services,
2018,
25th ACM SIGSAC Conference on Computer and Communications Security (ACM CCS'18, CCF-A)
Lei Zhang, Zhemin Yang, Yuyu He, Zhenyu Zhang, Zhiyun Qian, Geng Hong, Yuan Zhang and Min Yang