default search action
Yinzhi Cao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c64]Haolin Yuan, William Paul, John N. Aucott, Philippe Burlina, Yinzhi Cao:
PFEDEDIT: Personalized Federated Learning via Automated Model Editing. ECCV (79) 2024: 91-107 - [c63]Yuchen Yang, Kwonjoon Lee, Behzad Dariush, Yinzhi Cao, Shao-Yuan Lo:
Follow the Rules: Reasoning for Video Anomaly Detection with Large Language Models. ECCV (81) 2024: 304-322 - [c62]Zihao Zhao, Yuchen Yang, Yijiang Li, Yinzhi Cao:
RippleCOT: Amplifying Ripple Effect of Knowledge Editing in Language Models via Chain-of-Thought In-Context Learning. EMNLP (Findings) 2024: 6337-6347 - [c61]Yue Huang, Lichao Sun, Haoran Wang, Siyuan Wu, Qihui Zhang, Yuan Li, Chujie Gao, Yixin Huang, Wenhan Lyu, Yixuan Zhang, Xiner Li, Hanchi Sun, Zhengliang Liu, Yixin Liu, Yijue Wang, Zhikun Zhang, Bertie Vidgen, Bhavya Kailkhura, Caiming Xiong, Chaowei Xiao, Chunyuan Li, Eric P. Xing, Furong Huang, Hao Liu, Heng Ji, Hongyi Wang, Huan Zhang, Huaxiu Yao, Manolis Kellis, Marinka Zitnik, Meng Jiang, Mohit Bansal, James Zou, Jian Pei, Jian Liu, Jianfeng Gao, Jiawei Han, Jieyu Zhao, Jiliang Tang, Jindong Wang, Joaquin Vanschoren, John C. Mitchell, Kai Shu, Kaidi Xu, Kai-Wei Chang, Lifang He, Lifu Huang, Michael Backes, Neil Zhenqiang Gong, Philip S. Yu, Pin-Yu Chen, Quanquan Gu, Ran Xu, Rex Ying, Shuiwang Ji, Suman Jana, Tianlong Chen, Tianming Liu, Tianyi Zhou, William Wang, Xiang Li, Xiangliang Zhang, Xiao Wang, Xing Xie, Xun Chen, Xuyu Wang, Yan Liu, Yanfang Ye, Yinzhi Cao, Yong Chen, Yue Zhao:
Position: TrustLLM: Trustworthiness in Large Language Models. ICML 2024 - [c60]Raphael J. Sofaer, Yaniv David, Mingqing Kang, Jianjia Yu, Yinzhi Cao, Junfeng Yang, Jason Nieh:
RogueOne: Detecting Rogue Updates via Differential Data-flow Analysis Using Trust Domains. ICSE 2024: 101:1-101:13 - [c59]David Na, Samuel Nathanson, Yungjun Yoo, Yinzhi Cao, Lanier Watkins:
Showcasing the Threat of Scalable Generative AI Disinformation through Social Media Simulation. INFOCOM (Workshops) 2024: 1-2 - [c58]Xiaolin Du, Zhemin Yang, Jiapeng Lin, Yinzhi Cao, Min Yang:
Withdrawing is believing? Detecting Inconsistencies between Withdrawal Choices and Third-party Data Collections in Mobile Apps. SP 2024: 735-751 - [c57]Yuchen Yang, Bo Hui, Haolin Yuan, Neil Gong, Yinzhi Cao:
SneakyPrompt: Jailbreaking Text-to-image Generative Models. SP 2024: 897-912 - [c56]Bofei Chen, Lei Zhang, Xinyou Huang, Yinzhi Cao, Keke Lian, Yuan Zhang, Min Yang:
Efficient Detection of Java Deserialization Gadget Chains via Bottom-up Gadget Search and Dataflow-aided Payload Construction. SP 2024: 3961-3978 - [c55]Zhengyu Liu, Kecheng An, Yinzhi Cao:
Undefined-oriented Programming: Detecting and Chaining Prototype Pollution Gadgets in Node.js Template Engines for Malicious Consequences. SP 2024: 4015-4033 - [i19]Lichao Sun, Yue Huang, Haoran Wang, Siyuan Wu, Qihui Zhang, Chujie Gao, Yixin Huang, Wenhan Lyu, Yixuan Zhang, Xiner Li, Zhengliang Liu, Yixin Liu, Yijue Wang, Zhikun Zhang, Bhavya Kailkhura, Caiming Xiong, Chaowei Xiao, Chunyuan Li, Eric P. Xing, Furong Huang, Hao Liu, Heng Ji, Hongyi Wang, Huan Zhang, Huaxiu Yao, Manolis Kellis, Marinka Zitnik, Meng Jiang, Mohit Bansal, James Zou, Jian Pei, Jian Liu, Jianfeng Gao, Jiawei Han, Jieyu Zhao, Jiliang Tang, Jindong Wang, John C. Mitchell, Kai Shu, Kaidi Xu, Kai-Wei Chang, Lifang He, Lifu Huang, Michael Backes, Neil Zhenqiang Gong, Philip S. Yu, Pin-Yu Chen, Quanquan Gu, Ran Xu, Rex Ying, Shuiwang Ji, Suman Jana, Tianlong Chen, Tianming Liu, Tianyi Zhou, William Wang, Xiang Li, Xiangliang Zhang, Xiao Wang, Xing Xie, Xun Chen, Xuyu Wang, Yan Liu, Yanfang Ye, Yinzhi Cao, Yue Zhao:
TrustLLM: Trustworthiness in Large Language Models. CoRR abs/2401.05561 (2024) - [i18]Md. Imran Hossen, Jianyi Zhang, Yinzhi Cao, Xiali Hei:
Assessing Cybersecurity Vulnerabilities in Code Large Language Models. CoRR abs/2404.18567 (2024) - [i17]Bo Hui, Haolin Yuan, Neil Zhenqiang Gong, Philippe Burlina, Yinzhi Cao:
PLeak: Prompt Leaking Attacks against Large Language Model Applications. CoRR abs/2405.06823 (2024) - [i16]Yuling Cai, Fan Xiang, Guozhu Meng, Yinzhi Cao, Kai Chen:
AuthNet: Neural Network with Integrated Authentication Logic. CoRR abs/2405.15426 (2024) - [i15]Yuchen Yang, Kwonjoon Lee, Behzad Dariush, Yinzhi Cao, Shao-Yuan Lo:
Follow the Rules: Reasoning for Video Anomaly Detection with Large Language Models. CoRR abs/2407.10299 (2024) - [i14]Zengrui Liu, Jimmy Dani, Shujiang Wu, Yinzhi Cao, Nitesh Saxena:
Identified-and-Targeted: The First Early Evidence of the Privacy-Invasive Use of Browser Fingerprinting for Online Tracking. CoRR abs/2409.15656 (2024) - [i13]Zihao Zhao, Yuchen Yang, Yijiang Li, Yinzhi Cao:
RIPPLECOT: Amplifying Ripple Effect of Knowledge Editing in Language Models via Chain-of-Thought In-Context Learning. CoRR abs/2410.03122 (2024) - 2023
- [j7]Ling Jin, Yinzhi Cao, Yan Chen, Di Zhang, Simone Campanoni:
ExGen: Cross-platform, Automated Exploit Generation for Smart Contract Vulnerabilities. IEEE Trans. Dependable Secur. Comput. 20(1): 650-664 (2023) - [j6]Xiaohan Zhang, Mi Zhang, Yuan Zhang, Ming Zhong, Xin Zhang, Yinzhi Cao, Min Yang:
Slowing Down the Aging of Learning-Based Malware Detectors With API Knowledge. IEEE Trans. Dependable Secur. Comput. 20(2): 902-916 (2023) - [j5]Xuechao Du, Xiang Pan, Yinzhi Cao, Boyuan He, Gan Fang, Yan Chen, Daigang Xu:
FlowCog: Context-Aware Semantic Extraction and Analysis of Information Flow Leaks in Android Apps. IEEE Trans. Mob. Comput. 22(11): 6460-6476 (2023) - [c54]Jianjia Yu, Song Li, Junmin Zhu, Yinzhi Cao:
CoCo: Efficient Browser Extension Vulnerability Detection via Coverage-guided, Concurrent Abstract Interpretation. CCS 2023: 2441-2455 - [c53]Yuchen Yang, Haolin Yuan, Bo Hui, Neil Zhenqiang Gong, Neil Fendley, Philippe Burlina, Yinzhi Cao:
Fortifying Federated Learning against Membership Inference Attacks via Client-level Input Perturbation. DSN 2023: 288-301 - [c52]Haolin Yuan, John N. Aucott, Armin Hadzic, William Paul, Marcia Villegas de Flores, Philip Mathew, Philippe Burlina, Yinzhi Cao:
EdgeMixup: Embarrassingly Simple Data Alteration to Improve Lyme Disease Lesion Segmentation and Diagnosis Fairness. MICCAI (4) 2023: 374-384 - [c51]Faysal Hossain Shezan, Zihao Su, Mingqing Kang, Nicholas Phair, Patrick William Thomas, Michelangelo van Dam, Yinzhi Cao, Yuan Tian:
CHKPLUG: Checking GDPR Compliance of WordPress Plugins via Cross-language Code Property Graph. NDSS 2023 - [c50]Shujiang Wu, Pengfei Sun, Yao Zhao, Yinzhi Cao:
Him of Many Faces: Characterizing Billion-scale Adversarial and Benign Browser Fingerprints on Commercial Websites. NDSS 2023 - [c49]Jianjia Yu, Zifeng Kang, Yinzhi Cao:
MiniTaintDev: Unveiling Mini-App Vulnerabilities through Dynamic Taint Analysis. SaTS@CCS 2023: 41-45 - [c48]Xiaohan Zhang, Haoqi Ye, Ziqi Huang, Xiao Ye, Yinzhi Cao, Yuan Zhang, Min Yang:
Understanding the (In)Security of Cross-side Face Verification Systems in Mobile Apps: A System Perspective. SP 2023: 934-950 - [c47]Mingqing Kang, Yichao Xu, Song Li, Rigel Gjomemo, Jianwei Hou, V. N. Venkatakrishnan, Yinzhi Cao:
Scaling JavaScript Abstract Interpretation to Detect and Exploit Node.js Taint-style Vulnerability. SP 2023: 1059-1076 - [c46]Jonathan Prokos, Neil Fendley, Matthew Green, Roei Schuster, Eran Tromer, Tushar M. Jois, Yinzhi Cao:
Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning. USENIX Security Symposium 2023: 211-228 - [c45]Yuchen Yang, Bo Hui, Haolin Yuan, Neil Zhenqiang Gong, Yinzhi Cao:
PrivateFL: Accurate, Differentially Private Federated Learning via Personalized Data Transformation. USENIX Security Symposium 2023: 1595-1612 - [c44]Maximilian Zinkus, Yinzhi Cao, Matthew D. Green:
McFIL: Model Counting Functionality-Inherent Leakage. USENIX Security Symposium 2023: 7001-7018 - [i12]Yuchen Yang, Bo Hui, Haolin Yuan, Neil Zhenqiang Gong, Yinzhi Cao:
SneakyPrompt: Evaluating Robustness of Text-to-image Generative Models' Safety Filters. CoRR abs/2305.12082 (2023) - [i11]Maximilian Zinkus, Yinzhi Cao, Matthew Green:
McFIL: Model Counting Functionality-Inherent Leakage. CoRR abs/2306.05633 (2023) - 2022
- [c43]Binghui Wang, Tianchen Zhou, Song Li, Yinzhi Cao, Neil Zhenqiang Gong:
GraphTrack: A Graph-based Cross-Device Tracking Framework. AsiaCCS 2022: 82-96 - [c42]Haolin Yuan, Bo Hui, Yuchen Yang, Philippe Burlina, Neil Zhenqiang Gong, Yinzhi Cao:
Addressing Heterogeneity in Federated Learning via Distributional Transformation. ECCV (38) 2022: 179-195 - [c41]Zifeng Kang, Song Li, Yinzhi Cao:
Probe the Proto: Measuring Client-Side Prototype Pollution Vulnerabilities of One Million Real-world Websites. NDSS 2022 - [c40]Song Li, Mingqing Kang, Jianwei Hou, Yinzhi Cao:
Mining Node.js Vulnerabilities via Object Dependence Graph and Query. USENIX Security Symposium 2022: 143-160 - [c39]Lei Zhang, Zhibo Zhang, Ancong Liu, Yinzhi Cao, Xiaohan Zhang, Yanjun Chen, Yuan Zhang, Guangliang Yang, Min Yang:
Identity Confusion in WebView-based Mobile App-in-app Ecosystems. USENIX Security Symposium 2022: 1597-1613 - [c38]Youkun Shi, Yuan Zhang, Tianhan Luo, Xiangyu Mao, Yinzhi Cao, Ziwen Wang, Yudi Zhao, Zongan Huang, Min Yang:
Backporting Security Patches of Web Applications: A Prototype Design and Implementation on Injection Vulnerability Patches. USENIX Security Symposium 2022: 1993-2010 - [c37]Shujiang Wu, Jianjia Yu, Min Yang, Yinzhi Cao:
Rendering Contention Channel Made Practical in Web Browsers. USENIX Security Symposium 2022: 3183-3199 - [i10]Haolin Yuan, Armin Hadzic, William Paul, Daniella Villegas de Flores, Philip Mathew, John N. Aucott, Yinzhi Cao, Philippe Burlina:
EdgeMixup: Improving Fairness for Skin Disease Classification and Segmentation. CoRR abs/2202.13883 (2022) - [i9]Binghui Wang, Tianchen Zhou, Song Li, Yinzhi Cao, Neil Zhenqiang Gong:
GraphTrack: A Graph-based Cross-Device Tracking Framework. CoRR abs/2203.06833 (2022) - [i8]Haolin Yuan, Bo Hui, Yuchen Yang, Philippe Burlina, Neil Zhenqiang Gong, Yinzhi Cao:
Addressing Heterogeneity in Federated Learning via Distributional Transformation. CoRR abs/2210.15025 (2022) - 2021
- [c36]William Paul, Yinzhi Cao, Miaomiao Zhang, Philippe Burlina:
Defending Medical Image Diagnostics Against Privacy Attacks Using Generative Methods: Application to Retinal Diagnostics. CLIP/DCL/LL-COVID19/PPML@MICCAI 2021: 174-187 - [c35]Bo Hui, Yuchen Yang, Haolin Yuan, Philippe Burlina, Neil Zhenqiang Gong, Yinzhi Cao:
Practical Blind Membership Inference Attack via Differential Comparisons. NDSS 2021 - [c34]Song Li, Mingqing Kang, Jianwei Hou, Yinzhi Cao:
Detecting Node.js prototype pollution vulnerabilities via object lookup analysis. ESEC/SIGSOFT FSE 2021: 268-279 - [c33]Zhihao Bai, Ke Wang, Hang Zhu, Yinzhi Cao, Xin Jin:
Runtime Recovery of Web Applications under Zero-Day ReDoS Attacks. SP 2021: 1575-1588 - [i7]Bo Hui, Yuchen Yang, Haolin Yuan, Philippe Burlina, Neil Zhenqiang Gong, Yinzhi Cao:
Practical Blind Membership Inference Attack via Differential Comparisons. CoRR abs/2101.01341 (2021) - [i6]William Paul, Yinzhi Cao, Miaomiao Zhang, Philippe Burlina:
Defending Medical Image Diagnostics against Privacy Attacks using Generative Methods. CoRR abs/2103.03078 (2021) - [i5]Jonathan Prokos, Tushar M. Jois, Neil Fendley, Roei Schuster, Matthew Green, Eran Tromer, Yinzhi Cao:
Squint Hard Enough: Evaluating Perceptual Hashing with Machine Learning. IACR Cryptol. ePrint Arch. 2021: 1531 (2021) - 2020
- [c32]Xiaohan Zhang, Yuan Zhang, Ming Zhong, Daizong Ding, Yinzhi Cao, Yukun Zhang, Mi Zhang, Min Yang:
Enhancing State-of-the-art Classifiers with API Semantics to Detect Evolved Android Malware. CCS 2020: 757-770 - [c31]Zhanhao Chen, Yinzhi Cao:
JSKernel: Fortifying JavaScript against Web Concurrency Attacks via a Kernel-Like Structure. DSN 2020: 64-75 - [c30]Chenglin Yang, Adam Kortylewski, Cihang Xie, Yinzhi Cao, Alan L. Yuille:
PatchAttack: A Black-Box Texture-Based Attack with Reinforcement Learning. ECCV (26) 2020: 681-698 - [c29]Song Li, Yinzhi Cao:
Who Touched My Browser Fingerprint?: A Large-scale Measurement Study and Classification of Fingerprint Dynamics. Internet Measurement Conference 2020: 370-385 - [c28]Faysal Hossain Shezan, Kaiming Cheng, Zhen Zhang, Yinzhi Cao, Yuan Tian:
TKPERM: Cross-platform Permission Knowledge Transfer to Detect Overprivileged Third-party Applications. NDSS 2020 - [c27]Yuyu He, Lei Zhang, Zhemin Yang, Yinzhi Cao, Keke Lian, Shuai Li, Wei Yang, Zhibo Zhang, Min Yang, Yuan Zhang, Haixin Duan:
TextExerciser: Feedback-driven Text Input Exercising for Android Applications. SP 2020: 1071-1087 - [c26]Shunfan Zhou, Zhemin Yang, Jie Xiang, Yinzhi Cao, Min Yang, Yuan Zhang:
An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem. USENIX Security Symposium 2020: 2793-2810 - [i4]Chenglin Yang, Adam Kortylewski, Cihang Xie, Yinzhi Cao, Alan L. Yuille:
PatchAttack: A Black-box Texture-based Attack with Reinforcement Learning. CoRR abs/2004.05682 (2020)
2010 – 2019
- 2019
- [j4]Kexin Pei, Yinzhi Cao, Junfeng Yang, Suman Jana:
DeepXplore: automated whitebox testing of deep learning systems. Commun. ACM 62(11): 137-145 (2019) - [j3]Kexin Pei, Shiqi Wang, Yuchi Tian, Justin Whitehouse, Carl Vondrick, Yinzhi Cao, Baishakhi Ray, Suman Jana, Junfeng Yang:
Bringing Engineering Rigor to Deep Learning. ACM SIGOPS Oper. Syst. Rev. 53(1): 59-67 (2019) - [c25]Shujiang Wu, Song Li, Yinzhi Cao, Ningfei Wang:
Rendered Private: Making GLSL Execution Uniform to Prevent WebGL-based Browser Fingerprinting. USENIX Security Symposium 2019: 1645-1660 - 2018
- [j2]Kexin Pei, Yinzhi Cao, Junfeng Yang, Suman Jana:
DeepXplore: Automated Whitebox Testing of Deep Learning Systems. GetMobile Mob. Comput. Commun. 22(3): 36-38 (2018) - [c24]Yinzhi Cao, Alexander Fangxiao Yu, Andrew Aday, Eric Stahl, Jon Merwine, Junfeng Yang:
Efficient Repair of Polluted Machine Learning Systems via Causal Unlearning. AsiaCCS 2018: 735-747 - [c23]Zhiheng Liu, Zhen Zhang, Yinzhi Cao, Zhaohan Xi, Shihao Jing, Humberto J. La Roche:
Towards a Secure Zero-rating Framework with Three Parties. USENIX Security Symposium 2018: 711-728 - [c22]Xiang Pan, Yinzhi Cao, Xuechao Du, Boyuan He, Gan Fang, Rui Shao, Yan Chen:
FlowCog: Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps. USENIX Security Symposium 2018: 1669-1685 - 2017
- [c21]Yinzhi Cao, Zhanhao Chen, Song Li, Shujiang Wu:
Deterministic Browser. CCS 2017: 163-178 - [c20]Yinzhi Cao, Song Li, Erik Wijmans:
(Cross-)Browser Fingerprinting via OS and Hardware Level Features. NDSS 2017 - [c19]Kexin Pei, Yinzhi Cao, Junfeng Yang, Suman Jana:
DeepXplore: Automated Whitebox Testing of Deep Learning Systems. SOSP 2017: 1-18 - [i3]Kexin Pei, Yinzhi Cao, Junfeng Yang, Suman Jana:
DeepXplore: Automated Whitebox Testing of Deep Learning Systems. CoRR abs/1705.06640 (2017) - [i2]Yinzhi Cao, Zhanhao Chen, Song Li, Shujiang Wu:
Deterministic Browser. CoRR abs/1708.06774 (2017) - [i1]Kexin Pei, Yinzhi Cao, Junfeng Yang, Suman Jana:
Towards Practical Verification of Machine Learning: The Case of Computer Vision Systems. CoRR abs/1712.01785 (2017) - 2016
- [c18]Xiang Pan, Yinzhi Cao, Shuangping Liu, Yu Zhou, Yan Chen, Tingzhe Zhou:
CSPAutoGen: Black-box Enforcement of Content Security Policy upon Real-world Websites. CCS 2016: 653-665 - 2015
- [c17]Yinzhi Cao, Xiang Pan, Yan Chen:
SafePay: Protecting against credit card forgery with existing magnetic card readers. CNS 2015: 164-172 - [c16]Yinzhi Cao, Yanick Fratantonio, Antonio Bianchi, Manuel Egele, Christopher Kruegel, Giovanni Vigna, Yan Chen:
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework. NDSS 2015 - [c15]Xiang Pan, Yinzhi Cao, Yan Chen:
I Do Not Know What You Visited Last Summer: Protecting users from stateful third-party web tracking with TrackingFree browser. NDSS 2015 - [c14]Vaibhav Rastogi, Zhengyang Qu, Jedidiah McClurg, Yinzhi Cao, Yan Chen:
Uranine: Real-time Privacy Leakage Monitoring without System Modification for Android. SecureComm 2015: 256-276 - [c13]Yinzhi Cao, Junfeng Yang:
Towards Making Systems Forget with Machine Unlearning. IEEE Symposium on Security and Privacy 2015: 463-480 - [c12]Boyuan He, Vaibhav Rastogi, Yinzhi Cao, Yan Chen, V. N. Venkatakrishnan, Runqing Yang, Zhenrui Zhang:
Vetting SSL Usage in Applications with SSLINT. IEEE Symposium on Security and Privacy 2015: 519-534 - 2014
- [c11]Yinzhi Cao, Xiang Pan, Yan Chen, Jianwei Zhuge:
JShield: towards real-time and vulnerability-based detection of polluted drive-by download attacks. ACSAC 2014: 466-475 - [c10]Yinzhi Cao, Yan Shoshitaishvili, Kevin Borgolte, Christopher Krügel, Giovanni Vigna, Yan Chen:
Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel. RAID 2014: 276-298 - [c9]Yinzhi Cao, Chao Yang, Vaibhav Rastogi, Yan Chen, Guofei Gu:
Abusing Browser Address Bar for Fun and Profit - An Empirical Investigation of Add-On Cross Site Scripting Attacks. SecureComm (1) 2014: 582-601 - 2013
- [j1]Yao Zhao, Yinzhi Cao, Yan Chen, Ming Zhang, Anup Goyal:
Rake: Semantics Assisted Network-Based Tracing Framework. IEEE Trans. Netw. Serv. Manag. 10(1): 3-14 (2013) - [c8]Yinzhi Cao, Vaibhav Rastogi, Zhichun Li, Yan Chen, Alexander Moshchuk:
Redefining web browser principals with a Configurable Origin Policy. DSN 2013: 1-12 - [c7]Xun Lu, Jianwei Zhuge, Ruoyu Wang, Yinzhi Cao, Yan Chen:
De-obfuscation and Detection of Malicious PDF Files with High Accuracy. HICSS 2013: 4890-4899 - 2012
- [c6]Yinzhi Cao, Zhichun Li, Vaibhav Rastogi, Yan Chen, Xitao Wen:
Virtual browser: a virtualized browser to sandbox third-party JavaScripts with enhanced security. AsiaCCS 2012: 8-9 - [c5]Yinzhi Cao, Vinod Yegneswaran, Phillip A. Porras, Yan Chen:
PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks. NDSS 2012 - 2011
- [c4]Yinzhi Cao, Vinod Yegneswaran, Phillip A. Porras, Yan Chen:
Poster: a path-cutting approach to blocking XSS worms in social web networks. CCS 2011: 745-748 - [c3]Yao Zhao, Yinzhi Cao, Yan Chen, Ming Zhang, Anup Goyal:
Rake: Semantics assisted network-based tracing framework. IWQoS 2011: 1-9 - [c2]Zhichun Li, Yi Tang, Yinzhi Cao, Vaibhav Rastogi, Yan Chen, Bin Liu, Clint Sbisa:
WebShield: Enabling Various Web Defense Techniques without Client Side Modifications. NDSS 2011 - 2010
- [c1]Yinzhi Cao, Zhichun Li, Vaibhav Rastogi, Yan Chen:
Virtual browser: a web-level sandbox to secure third-party JavaScript without sacrificing functionality. CCS 2010: 654-656
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 19:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint