BibTeX records: Chao Yang 0022

download as .bib file

@inproceedings{DBLP:conf/icdcs/YangZG17,
  author       = {Chao Yang and
                  Jialong Zhang and
                  Guofei Gu},
  editor       = {Kisung Lee and
                  Ling Liu},
  title        = {Understanding the Market-Level and Network-Level Behaviors of the
                  Android Malware Ecosystem},
  booktitle    = {37th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2017, Atlanta, GA, USA, June 5-8, 2017},
  pages        = {2452--2457},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICDCS.2017.297},
  doi          = {10.1109/ICDCS.2017.297},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/YangZG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/YangYGYTG15,
  author       = {Chao Yang and
                  Guangliang Yang and
                  Ashish Gehani and
                  Vinod Yegneswaran and
                  Dawood Tariq and
                  Guofei Gu},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {58--77},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_4},
  doi          = {10.1007/978-3-319-28865-9\_4},
  timestamp    = {Wed, 29 Jun 2022 15:37:43 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/YangYGYTG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YangZG14,
  author       = {Chao Yang and
                  Jialong Zhang and
                  Guofei Gu},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {A taste of tweets: reverse engineering Twitter spammers},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {86--95},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664258},
  doi          = {10.1145/2664243.2664258},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/YangZG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/YangXGYP14,
  author       = {Chao Yang and
                  Zhaoyan Xu and
                  Guofei Gu and
                  Vinod Yegneswaran and
                  Phillip A. Porras},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {DroidMiner: Automated Mining and Characterization of Fine-grained
                  Malicious Behaviors in Android Applications},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8712},
  pages        = {163--182},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11203-9\_10},
  doi          = {10.1007/978-3-319-11203-9\_10},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/YangXGYP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/CaoYRCG14,
  author       = {Yinzhi Cao and
                  Chao Yang and
                  Vaibhav Rastogi and
                  Yan Chen and
                  Guofei Gu},
  editor       = {Jing Tian and
                  Jiwu Jing and
                  Mudhakar Srivatsa},
  title        = {Abusing Browser Address Bar for Fun and Profit - An Empirical Investigation
                  of Add-On Cross Site Scripting Attacks},
  booktitle    = {International Conference on Security and Privacy in Communication
                  Networks - 10th International {ICST} Conference, SecureComm 2014,
                  Beijing, China, September 24-26, 2014, Revised Selected Papers, Part
                  {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {152},
  pages        = {582--601},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-23829-6\_45},
  doi          = {10.1007/978-3-319-23829-6\_45},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/CaoYRCG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangHG13,
  author       = {Chao Yang and
                  Robert Chandler Harkreader and
                  Guofei Gu},
  title        = {Empirical Evaluation and New Design for Fighting Evolving Twitter
                  Spammers},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {8},
  number       = {8},
  pages        = {1280--1293},
  year         = {2013},
  url          = {https://doi.org/10.1109/TIFS.2013.2267732},
  doi          = {10.1109/TIFS.2013.2267732},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YangHG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/VikramYG13,
  author       = {Shardul Vikram and
                  Chao Yang and
                  Guofei Gu},
  title        = {{NOMAD:} Towards non-intrusive moving-target defense against web bots},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {55--63},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682692},
  doi          = {10.1109/CNS.2013.6682692},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/VikramYG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/comsnets/AmleshwaramRYGY13,
  author       = {Amit A. Amleshwaram and
                  A. L. Narasimha Reddy and
                  Sandeep Yadav and
                  Guofei Gu and
                  Chao Yang},
  title        = {{CATS:} Characterizing automation of Twitter spammers},
  booktitle    = {Fifth International Conference on Communication Systems and Networks,
                  {COMSNETS} 2013, Bangalore, India, January 7-10, 2013},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/COMSNETS.2013.6465541},
  doi          = {10.1109/COMSNETS.2013.6465541},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/comsnets/AmleshwaramRYGY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangSG12,
  author       = {Chao Yang and
                  Yimin Song and
                  Guofei Gu},
  title        = {Active User-Side Evil Twin Access Point Detection Using Statistical
                  Techniques},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {7},
  number       = {5},
  pages        = {1638--1651},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIFS.2012.2207383},
  doi          = {10.1109/TIFS.2012.2207383},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YangSG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YangYPG12,
  author       = {Chao Yang and
                  Vinod Yegneswaran and
                  Phillip A. Porras and
                  Guofei Gu},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Detecting money-stealing apps in alternative Android markets},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {1034--1036},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382316},
  doi          = {10.1145/2382196.2382316},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/YangYPG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ZhangYXG12,
  author       = {Jialong Zhang and
                  Chao Yang and
                  Zhaoyan Xu and
                  Guofei Gu},
  editor       = {Davide Balzarotti and
                  Salvatore J. Stolfo and
                  Marco Cova},
  title        = {PoisonAmplifier: {A} Guided Approach of Discovering Compromised Websites
                  through Reversing Search Poisoning Attacks},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 15th International
                  Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7462},
  pages        = {230--253},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33338-5\_12},
  doi          = {10.1007/978-3-642-33338-5\_12},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/ZhangYXG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/YangHZSG12,
  author       = {Chao Yang and
                  Robert Chandler Harkreader and
                  Jialong Zhang and
                  Seungwon Shin and
                  Guofei Gu},
  editor       = {Alain Mille and
                  Fabien Gandon and
                  Jacques Misselis and
                  Michael Rabinovich and
                  Steffen Staab},
  title        = {Analyzing spammers' social networks for fun and profit: a case study
                  of cyber criminal ecosystem on twitter},
  booktitle    = {Proceedings of the 21st World Wide Web Conference 2012, {WWW} 2012,
                  Lyon, France, April 16-20, 2012},
  pages        = {71--80},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2187836.2187847},
  doi          = {10.1145/2187836.2187847},
  timestamp    = {Fri, 16 Apr 2021 10:04:12 +0200},
  biburl       = {https://dblp.org/rec/conf/www/YangHZSG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/YangHG11,
  author       = {Chao Yang and
                  Robert Chandler Harkreader and
                  Guofei Gu},
  editor       = {Robin Sommer and
                  Davide Balzarotti and
                  Gregor Maier},
  title        = {Die Free or Live Hard? Empirical Evaluation and New Design for Fighting
                  Evolving Twitter Spammers},
  booktitle    = {Recent Advances in Intrusion Detection - 14th International Symposium,
                  {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6961},
  pages        = {318--337},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23644-0\_17},
  doi          = {10.1007/978-3-642-23644-0\_17},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/YangHG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/SongYG10,
  author       = {Yimin Song and
                  Chao Yang and
                  Guofei Gu},
  title        = {Who is peeping at your passwords at Starbucks? - To catch an evil
                  twin access point},
  booktitle    = {Proceedings of the 2010 {IEEE/IFIP} International Conference on Dependable
                  Systems and Networks, {DSN} 2010, Chicago, IL, USA, June 28 - July
                  1 2010},
  pages        = {323--332},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/DSN.2010.5544302},
  doi          = {10.1109/DSN.2010.5544302},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/SongYG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics