Yinzhi Cao
Yinzhi Cao
Email verificata su jhu.edu
TitoloCitata daAnno
Deepxplore: Automated whitebox testing of deep learning systems
K Pei, Y Cao, J Yang, S Jana
Proceedings of the 26th Symposium on Operating Systems Principles, 1-18, 2017
3182017
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework.
Y Cao, Y Fratantonio, A Bianchi, M Egele, C Kruegel, G Vigna, Y Chen
NDSS, 2015
1612015
PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks.
Y Cao, V Yegneswaran, PA Porras, Y Chen
NDSS, 2012
572012
(Cross-)Browser Fingerprinting via OS and Hardware Level Features
Y Cao, S Li, E Wijmans
Proceedings of Network & Distributed System Security Symposium (NDSS), 2017
532017
Towards making systems forget with machine unlearning
Y Cao, J Yang
2015 IEEE Symposium on Security and Privacy, 463-480, 2015
522015
Towards practical verification of machine learning: The case of computer vision systems
K Pei, Y Cao, J Yang, S Jana
arXiv preprint arXiv:1712.01785, 2017
402017
Vetting SSL usage in applications with SSLint
B He, V Rastogi, Y Cao, Y Chen, VN Venkatakrishnan, R Yang, Z Zhang
2015 IEEE Symposium on Security and Privacy, 519-534, 2015
372015
De-obfuscation and detection of malicious PDF files with high accuracy
X Lu, J Zhuge, R Wang, Y Cao, Y Chen
2013 46th Hawaii International Conference on System Sciences, 4890-4899, 2013
372013
WebShield: Enabling Various Web Defense Techniques without Client Side Modifications.
Z Li, Y Tang, Y Cao, V Rastogi, Y Chen, B Liu, C Sbisa
NDSS, 2011
352011
Uranine: Real-time privacy leakage monitoring without system modification for android
V Rastogi, Z Qu, J McClurg, Y Cao, Y Chen
International Conference on Security and Privacy in Communication Systems …, 2015
292015
I do not know what you visited last summer: Protecting users from third-party web tracking with trackingfree browser
X Pan, Y Cao, Y Chen
Proceedings of the 2015 Annual Network and Distributed System Security …, 2015
272015
Cspautogen: Black-box enforcement of content security policy upon real-world websites
X Pan, Y Cao, S Liu, Y Zhou, Y Chen, T Zhou
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
232016
Jshield: towards real-time and vulnerability-based detection of polluted drive-by download attacks
Y Cao, X Pan, Y Chen, J Zhuge
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
202014
Virtual browser: a virtualized browser to sandbox third-party javascripts with enhanced security
Y Cao, Z Li, V Rastogi, Y Chen, X Wen
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
172012
Protecting web-based single sign-on protocols against relying party impersonation attacks through a dedicated bi-directional authenticated secure channel
Y Cao, Y Shoshitaishvili, K Borgolte, C Kruegel, G Vigna, Y Chen
International Workshop on Recent Advances in Intrusion Detection, 276-298, 2014
152014
Redefining web browser principals with a configurable origin policy
Y Cao, V Rastogi, Z Li, Y Chen, A Moshchuk
2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2013
142013
Deterministic browser
Y Cao, Z Chen, S Li, S Wu
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
102017
Malicious code detection technologies
Y Cao, X Pan, Y Chen, J Zhuge, X Qian, J Fu
US Patent 9,213,839, 2015
82015
Virtual browser: a web-level sandbox to secure third-party JavaScript without sacrificing functionality
Y Cao, Z Li, V Rastogi, Y Chen
Proceedings of the 17th ACM conference on Computer and communications …, 2010
72010
Efficient repair of polluted machine learning systems via causal unlearning
Y Cao, AF Yu, A Aday, E Stahl, J Merwine, J Yang
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
62018
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20