Follow
Chuan Yue
Title
Cited by
Cited by
Year
Characterizing insecure JavaScript practices on the web
C Yue, H Wang
Proceedings of the 18th international conference on World wide web, 961-970, 2009
1662009
BogusBiter: A transparent protection against phishing attacks
C Yue, H Wang
ACM Transactions on Internet Technology (TOIT) 10 (2), 1-31, 2010
1482010
Real-time collaborative browsing
C Yue, H Wang
US Patent App. 12/567,295, 2010
1122010
Phishing suspiciousness in older and younger adults: The role of executive functioning
BE Gavett, R Zhao, SE John, CA Bussell, JR Roberts, C Yue
PloS one 12 (2), e0171620, 2017
922017
Anti-phishing in offense and defense
C Yue, H Wang
2008 Annual Computer Security Applications Conference (ACSAC), 345-354, 2008
722008
Attention please: Your attention check questions in survey studies can be automatically answered
W Pei, A Mayer, K Tu, C Yue
Proceedings of The Web Conference 2020, 1182-1193, 2020
612020
Mining least privilege attribute based access control policies
MW Sanders, C Yue
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
602019
All Your Browser-saved Passwords Could Belong to Us: a Security Analysis and a Cloud-based New Design
R Zhao, C Yue
ACM Conference on Data and Applications Security (CODASPY), 2013
552013
An automatic HTTP cookie management system
C Yue, M Xie, H Wang
Computer Networks 54 (13), 2182-2198, 2010
522010
Visualizing and interpreting rnn models in url-based phishing detection
T Feng, C Yue
Proceedings of the 25th ACM Symposium on Access Control Models and …, 2020
452020
A comparative measurement study of web tracking on mobile and desktop environments
Z Yang, C Yue
Proceedings on Privacy Enhancing Technologies 2020 (2), 2020
442020
A measurement study of insecure javascript practices on the web
C Yue, H Wang
ACM Transactions on the Web (TWEB) 7 (2), 1-39, 2013
432013
Toward a secure and usable cloud-based password manager for web browsers
R Zhao, C Yue
Computers & Security 46, 32-47, 2014
422014
Attacking and protecting tunneled traffic of smart home devices
A Alshehri, J Granley, C Yue
Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020
362020
Automatic cookie usage setting with cookiepicker
C Yue, M Xie, H Wang
37th Annual IEEE/IFIP International Conference on Dependable Systems and …, 2007
332007
Wtagraph: Web tracking and advertising detection using graph neural networks
Z Yang, W Pei, M Chen, C Yue
2022 IEEE Symposium on Security and Privacy (SP), 1540-1557, 2022
312022
Client side username/password credential protection
C Yue, H Wang
US Patent 8,307,433, 2012
302012
Design and evaluation of the highly insidious extreme phishing attacks
R Zhao, S John, S Karas, C Bussell, J Roberts, D Six, B Gavett, C Yue
Computers & Security 70, 634-647, 2017
292017
Website fingerprinting by power estimation based side-channel attacks on Android 7
Y Qin, C Yue
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
282018
Vulnerability and Risk Analysis of Two Commercial Browser and Cloud Based Password Managers
R Zhao, C Yue, K Sun
ASE Science Journal 1 (4), 1-15, 2013
282013
The system can't perform the operation now. Try again later.
Articles 1–20