Deepxplore: Automated whitebox testing of deep learning systems K Pei, Y Cao, J Yang, S Jana proceedings of the 26th Symposium on Operating Systems Principles, 1-18, 2017 | 548 | 2017 |
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework. Y Cao, Y Fratantonio, A Bianchi, M Egele, C Kruegel, G Vigna, Y Chen NDSS, 2015 | 191 | 2015 |
(Cross-)Browser Fingerprinting via OS and Hardware Level Features Y Cao, S Li, E Wijmans Proceedings of Network & Distributed System Security Symposium (NDSS), 2017 | 80 | 2017 |
Towards making systems forget with machine unlearning Y Cao, J Yang 2015 IEEE Symposium on Security and Privacy, 463-480, 2015 | 77 | 2015 |
Towards practical verification of machine learning: The case of computer vision systems K Pei, Y Cao, J Yang, S Jana arXiv preprint arXiv:1712.01785, 2017 | 57 | 2017 |
PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks. Y Cao, V Yegneswaran, PA Porras, Y Chen NDSS, 2012 | 57 | 2012 |
Vetting SSL usage in applications with SSLint B He, V Rastogi, Y Cao, Y Chen, VN Venkatakrishnan, R Yang, Z Zhang 2015 IEEE Symposium on Security and Privacy, 519-534, 2015 | 53 | 2015 |
De-obfuscation and detection of malicious PDF files with high accuracy X Lu, J Zhuge, R Wang, Y Cao, Y Chen 2013 46th Hawaii International Conference on System Sciences, 4890-4899, 2013 | 40 | 2013 |
WebShield: Enabling Various Web Defense Techniques without Client Side Modifications. Z Li, Y Tang, Y Cao, V Rastogi, Y Chen, B Liu, C Sbisa NDSS, 2011 | 35 | 2011 |
Uranine: Real-time privacy leakage monitoring without system modification for android V Rastogi, Z Qu, J McClurg, Y Cao, Y Chen International Conference on Security and Privacy in Communication Systems …, 2015 | 33 | 2015 |
I do not know what you visited last summer: Protecting users from third-party web tracking with trackingfree browser X Pan, Y Cao, Y Chen Proceedings of the 2015 Annual Network and Distributed System Security …, 2015 | 32 | 2015 |
Cspautogen: Black-box enforcement of content security policy upon real-world websites X Pan, Y Cao, S Liu, Y Zhou, Y Chen, T Zhou Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 30 | 2016 |
Jshield: towards real-time and vulnerability-based detection of polluted drive-by download attacks Y Cao, X Pan, Y Chen, J Zhuge Proceedings of the 30th Annual Computer Security Applications Conference …, 2014 | 23 | 2014 |
Flowcog: context-aware semantics extraction and analysis of information flow leaks in android apps X Pan, Y Cao, X Du, B He, G Fang, R Shao, Y Chen 27th {USENIX} Security Symposium ({USENIX} Security 18), 1669-1685, 2018 | 18* | 2018 |
Virtual browser: a virtualized browser to sandbox third-party javascripts with enhanced security Y Cao, Z Li, V Rastogi, Y Chen, X Wen Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012 | 18 | 2012 |
Deterministic browser Y Cao, Z Chen, S Li, S Wu Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 17 | 2017 |
Protecting web-based single sign-on protocols against relying party impersonation attacks through a dedicated bi-directional authenticated secure channel Y Cao, Y Shoshitaishvili, K Borgolte, C Kruegel, G Vigna, Y Chen International Workshop on Recent Advances in Intrusion Detection, 276-298, 2014 | 16 | 2014 |
Redefining web browser principals with a configurable origin policy Y Cao, V Rastogi, Z Li, Y Chen, A Moshchuk 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2013 | 14 | 2013 |
Efficient repair of polluted machine learning systems via causal unlearning Y Cao, AF Yu, A Aday, E Stahl, J Merwine, J Yang Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018 | 13 | 2018 |
Patchattack: A black-box texture-based attack with reinforcement learning C Yang, A Kortylewski, C Xie, Y Cao, A Yuille European Conference on Computer Vision, 681-698, 2020 | 10 | 2020 |