Characterizing insecure JavaScript practices on the web C Yue, H Wang Proceedings of the 18th international conference on World wide web, 961-970, 2009 | 166 | 2009 |
BogusBiter: A transparent protection against phishing attacks C Yue, H Wang ACM Transactions on Internet Technology (TOIT) 10 (2), 1-31, 2010 | 148 | 2010 |
Real-time collaborative browsing C Yue, H Wang US Patent App. 12/567,295, 2010 | 112 | 2010 |
Phishing suspiciousness in older and younger adults: The role of executive functioning BE Gavett, R Zhao, SE John, CA Bussell, JR Roberts, C Yue PloS one 12 (2), e0171620, 2017 | 92 | 2017 |
Anti-phishing in offense and defense C Yue, H Wang 2008 Annual Computer Security Applications Conference (ACSAC), 345-354, 2008 | 72 | 2008 |
Attention please: Your attention check questions in survey studies can be automatically answered W Pei, A Mayer, K Tu, C Yue Proceedings of The Web Conference 2020, 1182-1193, 2020 | 61 | 2020 |
Mining least privilege attribute based access control policies MW Sanders, C Yue Proceedings of the 35th Annual Computer Security Applications Conference …, 2019 | 60 | 2019 |
All Your Browser-saved Passwords Could Belong to Us: a Security Analysis and a Cloud-based New Design R Zhao, C Yue ACM Conference on Data and Applications Security (CODASPY), 2013 | 55 | 2013 |
An automatic HTTP cookie management system C Yue, M Xie, H Wang Computer Networks 54 (13), 2182-2198, 2010 | 52 | 2010 |
Visualizing and interpreting rnn models in url-based phishing detection T Feng, C Yue Proceedings of the 25th ACM Symposium on Access Control Models and …, 2020 | 45 | 2020 |
A comparative measurement study of web tracking on mobile and desktop environments Z Yang, C Yue Proceedings on Privacy Enhancing Technologies 2020 (2), 2020 | 44 | 2020 |
A measurement study of insecure javascript practices on the web C Yue, H Wang ACM Transactions on the Web (TWEB) 7 (2), 1-39, 2013 | 43 | 2013 |
Toward a secure and usable cloud-based password manager for web browsers R Zhao, C Yue Computers & Security 46, 32-47, 2014 | 42 | 2014 |
Attacking and protecting tunneled traffic of smart home devices A Alshehri, J Granley, C Yue Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020 | 36 | 2020 |
Automatic cookie usage setting with cookiepicker C Yue, M Xie, H Wang 37th Annual IEEE/IFIP International Conference on Dependable Systems and …, 2007 | 33 | 2007 |
Wtagraph: Web tracking and advertising detection using graph neural networks Z Yang, W Pei, M Chen, C Yue 2022 IEEE Symposium on Security and Privacy (SP), 1540-1557, 2022 | 31 | 2022 |
Client side username/password credential protection C Yue, H Wang US Patent 8,307,433, 2012 | 30 | 2012 |
Design and evaluation of the highly insidious extreme phishing attacks R Zhao, S John, S Karas, C Bussell, J Roberts, D Six, B Gavett, C Yue Computers & Security 70, 634-647, 2017 | 29 | 2017 |
Website fingerprinting by power estimation based side-channel attacks on Android 7 Y Qin, C Yue 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 28 | 2018 |
Vulnerability and Risk Analysis of Two Commercial Browser and Cloud Based Password Managers R Zhao, C Yue, K Sun ASE Science Journal 1 (4), 1-15, 2013 | 28 | 2013 |