Seguir
Yinzhi Cao
Yinzhi Cao
Dirección de correo verificada de jhu.edu
Título
Citado por
Citado por
Año
Deepxplore: Automated whitebox testing of deep learning systems
K Pei, Y Cao, J Yang, S Jana
proceedings of the 26th Symposium on Operating Systems Principles, 1-18, 2017
17272017
Towards making systems forget with machine unlearning
Y Cao, J Yang
2015 IEEE symposium on security and privacy, 463-480, 2015
7242015
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework.
Y Cao, Y Fratantonio, A Bianchi, M Egele, C Kruegel, G Vigna, Y Chen
NDSS, 2015
2512015
Trustllm: Trustworthiness in large language models
Y Huang, L Sun, H Wang, S Wu, Q Zhang, Y Li, C Gao, Y Huang, W Lyu, ...
arXiv preprint arXiv:2401.05561, 2024
2462024
Enhancing state-of-the-art classifiers with api semantics to detect evolved android malware
X Zhang, Y Zhang, M Zhong, D Ding, Y Cao, Y Zhang, M Zhang, M Yang
Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020
1922020
(Cross-)Browser Fingerprinting via OS and Hardware Level Features
Y Cao, S Li, E Wijmans
Proceedings of Network & Distributed System Security Symposium (NDSS), 2017
1672017
Practical blind membership inference attack via differential comparisons
B Hui, Y Yang, H Yuan, P Burlina, NZ Gong, Y Cao
Network and Distributed System Security Symposium (NDSS 2021), 2021
1442021
Towards practical verification of machine learning: The case of computer vision systems.
K Pei, Y Cao, J Yang, S Jana
arXiv preprint arXiv:1712.01785, 2017
1352017
Patchattack: A black-box texture-based attack with reinforcement learning
C Yang, A Kortylewski, C Xie, Y Cao, A Yuille
European Conference on Computer Vision, 681-698, 2020
1202020
Sneakyprompt: Jailbreaking text-to-image generative models
Y Yang, B Hui, H Yuan, N Gong, Y Cao
2024 IEEE symposium on security and privacy (SP), 897-912, 2024
92*2024
Vetting SSL usage in applications with SSLINT
B He, V Rastogi, Y Cao, Y Chen, VN Venkatakrishnan, R Yang, Z Zhang
2015 IEEE Symposium on Security and Privacy, 519-534, 2015
862015
An ever-evolving game: Evaluation of real-world attacks and defenses in ethereum ecosystem
S Zhou, Z Yang, J Xiang, Y Cao, M Yang, Y Zhang
29th {USENIX} Security Symposium ({USENIX} Security 20), 2793-2810, 2020
752020
PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks.
Y Cao, V Yegneswaran, PA Porras, Y Chen
NDSS, 2012
712012
De-obfuscation and detection of malicious PDF files with high accuracy
X Lu, J Zhuge, R Wang, Y Cao, Y Chen
2013 46th Hawaii International Conference on System Sciences, 4890-4899, 2013
682013
Cspautogen: Black-box enforcement of content security policy upon real-world websites
X Pan, Y Cao, S Liu, Y Zhou, Y Chen, T Zhou
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
652016
Detecting node.js prototype pollution vulnerabilities via object lookup analysis
S Li, M Kang, J Hou, Y Cao
Proceedings of the 29th ACM Joint Meeting on European Software Engineering …, 2021
562021
FlowCog: Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps
X Pan, Y Cao, X Du, B He, G Fang, R Shao, Y Chen
27th USENIX Security Symposium (USENIX Security 18), 1669-1685, 2018
56*2018
Efficient repair of polluted machine learning systems via causal unlearning
Y Cao, AF Yu, A Aday, E Stahl, J Merwine, J Yang
Proceedings of the 2018 on Asia conference on computer and communications …, 2018
552018
Mining Node.js Vulnerabilities via Object Dependence Graph and Query
S Li, M Kang, J Hou, Y Cao
Proceedings of the USENIX Security Symposium, 2022
532022
I do not know what you visited last summer: Protecting users from third-party web tracking with trackingfree browser
X Pan, Y Cao, Y Chen
Proceedings of the 2015 Annual Network and Distributed System Security …, 2015
522015
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20