Chuan Yue
Chuan Yue
Associate Professor of Computer Science, Colorado School of Mines
Verified email at - Homepage
Cited by
Cited by
Characterizing insecure JavaScript practices on the web
C Yue, H Wang
Proceedings of the 18th international conference on World wide web, 961-970, 2009
BogusBiter: A transparent protection against phishing attacks
C Yue, H Wang
ACM Transactions on Internet Technology (TOIT) 10 (2), 1-31, 2010
Real-time collaborative browsing
C Yue, H Wang
US Patent App. 12/567,295, 2010
Anti-phishing in offense and defense
C Yue, H Wang
2008 Annual Computer Security Applications Conference (ACSAC), 345-354, 2008
Phishing suspiciousness in older and younger adults: The role of executive functioning
BE Gavett, R Zhao, SE John, CA Bussell, JR Roberts, C Yue
PLoS One 12 (2), e0171620, 2017
All Your Browser-saved Passwords Could Belong to Us: a Security Analysis and a Cloud-based New Design
R Zhao, C Yue
ACM Conference on Data and Applications Security (CODASPY), 2013
Toward a secure and usable cloud-based password manager for web browsers
R Zhao, C Yue
Computers & Security 46, 32-47, 2014
An automatic HTTP cookie management system
C Yue, M Xie, H Wang
Computer Networks 54 (13), 2182-2198, 2010
A measurement study of insecure javascript practices on the web
C Yue, H Wang
ACM Transactions on the Web (TWEB) 7 (2), 1-39, 2013
Automatic cookie usage setting with cookiepicker
C Yue, M Xie, H Wang
37th Annual IEEE/IFIP International Conference on Dependable Systems and …, 2007
Client side username/password credential protection
C Yue, H Wang
US Patent 8,307,433, 2012
SessionMagnifier: A simple approach to secure and convenient kiosk browsing
C Yue, H Wang
Proceedings of the 11th international conference on Ubiquitous computing …, 2009
Design and evaluation of the highly insidious extreme phishing attacks
R Zhao, S John, S Karas, C Bussell, J Roberts, D Six, B Gavett, C Yue
Computers & Security 70, 634-647, 2017
The Devil is Phishing: Rethinking Web Single Sign-On Systems Security
C Yue
USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 1-4, 2013
Profit-aware admission control for overload protection in e-commerce web sites
C Yue, H Wang
2007 Fifteenth IEEE International Workshop on Quality of Service, 188-193, 2007
A comparative measurement study of web tracking on mobile and desktop environments
Z Yang, C Yue
Proceedings on Privacy Enhancing Technologies 2020 (2), 2020
Vulnerability and Risk Analysis of Two Commercial Browser and Cloud Based Password Managers
R Zhao, C Yue, K Sun
ASE Science Journal 1 (4), 1-15, 2013
Mining least privilege attribute based access control policies
MW Sanders, C Yue
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
SafeSky: a secure cloud storage middleware for end-user applications
R Zhao, C Yue, B Tak, C Tang
2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS), 21-30, 2015
Website fingerprinting by power estimation based side-channel attacks on android 7
Y Qin, C Yue
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
The system can't perform the operation now. Try again later.
Articles 1–20