CHAO YANG
CHAO YANG
Email verificata su cse.tamu.edu
TitoloCitata daAnno
Analyzing Spammer’s Social Networks for Fun and Profit
C Yang, R Harkreader, J Zhang, S Shin, G Gu
280*2012
Die free or live hard? empirical evaluation and new design for fighting evolving twitter spammers
C Yang, RC Harkreader, G Gu
International Workshop on Recent Advances in Intrusion Detection, 318-337, 2011
2542011
Empirical evaluation and new design for fighting evolving twitter spammers
C Yang, R Harkreader, G Gu
IEEE Transactions on Information Forensics and Security 8 (8), 1280-1293, 2013
1882013
Droidminer: Automated mining and characterization of fine-grained malicious behaviors in android applications
C Yang, Z Xu, G Gu, V Yegneswaran, P Porras
European symposium on research in computer security, 163-182, 2014
1772014
Cats: Characterizing automation of twitter spammers
AA Amleshwaram, N Reddy, S Yadav, G Gu, C Yang
2013 Fifth International Conference on Communication Systems and Networks …, 2013
1082013
Who is peeping at your passwords at Starbucks?—To catch an evil twin access point
Y Song, C Yang, G Gu
2010 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2010
902010
Active user-side evil twin access point detection using statistical techniques
C Yang, Y Song, G Gu
IEEE Transactions on Information Forensics and Security 7 (5), 1638-1651, 2012
592012
Nomad: Towards non-intrusive moving-target defense against web bots
S Vikram, C Yang, G Gu
2013 IEEE Conference on Communications and Network Security (CNS), 55-63, 2013
332013
A taste of tweets: reverse engineering Twitter spammers
C Yang, J Zhang, G Gu
Proceedings of the 30th annual computer security applications conference, 86-95, 2014
232014
PoisonAmplifier: A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks
J Zhang, C Yang, Z Xu, G Gu
19*
Detecting money-stealing apps in alternative Android markets
C Yang, V Yegneswaran, P Porras, G Gu
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
182012
Using provenance patterns to vet sensitive behaviors in Android apps
C Yang, G Yang, A Gehani, V Yegneswaran, D Tariq, G Gu
International Conference on Security and Privacy in Communication Systems, 58-77, 2015
162015
Understanding the market-level and network-level behaviors of the Android malware ecosystem
C Yang, J Zhang, G Gu
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
72017
Security in wireless local area networks
C Yang, G Gu
Wireless Network Security, 39-58, 2013
52013
The Research of Fault-tolerant Mechanism of Grid Computing Based on Checkpoint Algorithm [J]
C YANG, W ZHANG, H ZHANG, Z TIAN, B FANG
Microelectronics & Computer 9, 2006
32006
Abusing Browser Address Bar for Fun and Profit - An Empirical Investigation of Add-On Cross Site Scripting Attacks
Y Cao, C Yang, V Rastogi, Y Chen, G Gu
International Conference on Security and Privacy in Communication Networks …, 2014
22014
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–16