Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Chao Yang 0022
@inproceedings{DBLP:conf/icdcs/YangZG17, author = {Chao Yang and Jialong Zhang and Guofei Gu}, editor = {Kisung Lee and Ling Liu}, title = {Understanding the Market-Level and Network-Level Behaviors of the Android Malware Ecosystem}, booktitle = {37th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2017, Atlanta, GA, USA, June 5-8, 2017}, pages = {2452--2457}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ICDCS.2017.297}, doi = {10.1109/ICDCS.2017.297}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/YangZG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/YangYGYTG15, author = {Chao Yang and Guangliang Yang and Ashish Gehani and Vinod Yegneswaran and Dawood Tariq and Guofei Gu}, editor = {Bhavani Thuraisingham and XiaoFeng Wang and Vinod Yegneswaran}, title = {Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps}, booktitle = {Security and Privacy in Communication Networks - 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {164}, pages = {58--77}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28865-9\_4}, doi = {10.1007/978-3-319-28865-9\_4}, timestamp = {Wed, 29 Jun 2022 15:37:43 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/YangYGYTG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/YangZG14, author = {Chao Yang and Jialong Zhang and Guofei Gu}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {A taste of tweets: reverse engineering Twitter spammers}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {86--95}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664258}, doi = {10.1145/2664243.2664258}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/YangZG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/YangXGYP14, author = {Chao Yang and Zhaoyan Xu and Guofei Gu and Vinod Yegneswaran and Phillip A. Porras}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8712}, pages = {163--182}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11203-9\_10}, doi = {10.1007/978-3-319-11203-9\_10}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/YangXGYP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/CaoYRCG14, author = {Yinzhi Cao and Chao Yang and Vaibhav Rastogi and Yan Chen and Guofei Gu}, editor = {Jing Tian and Jiwu Jing and Mudhakar Srivatsa}, title = {Abusing Browser Address Bar for Fun and Profit - An Empirical Investigation of Add-On Cross Site Scripting Attacks}, booktitle = {International Conference on Security and Privacy in Communication Networks - 10th International {ICST} Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {152}, pages = {582--601}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-23829-6\_45}, doi = {10.1007/978-3-319-23829-6\_45}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/CaoYRCG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangHG13, author = {Chao Yang and Robert Chandler Harkreader and Guofei Gu}, title = {Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {8}, number = {8}, pages = {1280--1293}, year = {2013}, url = {https://doi.org/10.1109/TIFS.2013.2267732}, doi = {10.1109/TIFS.2013.2267732}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YangHG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/VikramYG13, author = {Shardul Vikram and Chao Yang and Guofei Gu}, title = {{NOMAD:} Towards non-intrusive moving-target defense against web bots}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {55--63}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682692}, doi = {10.1109/CNS.2013.6682692}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/VikramYG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/comsnets/AmleshwaramRYGY13, author = {Amit A. Amleshwaram and A. L. Narasimha Reddy and Sandeep Yadav and Guofei Gu and Chao Yang}, title = {{CATS:} Characterizing automation of Twitter spammers}, booktitle = {Fifth International Conference on Communication Systems and Networks, {COMSNETS} 2013, Bangalore, India, January 7-10, 2013}, pages = {1--10}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/COMSNETS.2013.6465541}, doi = {10.1109/COMSNETS.2013.6465541}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/comsnets/AmleshwaramRYGY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangSG12, author = {Chao Yang and Yimin Song and Guofei Gu}, title = {Active User-Side Evil Twin Access Point Detection Using Statistical Techniques}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {7}, number = {5}, pages = {1638--1651}, year = {2012}, url = {https://doi.org/10.1109/TIFS.2012.2207383}, doi = {10.1109/TIFS.2012.2207383}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YangSG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YangYPG12, author = {Chao Yang and Vinod Yegneswaran and Phillip A. Porras and Guofei Gu}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Detecting money-stealing apps in alternative Android markets}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {1034--1036}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382316}, doi = {10.1145/2382196.2382316}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/YangYPG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ZhangYXG12, author = {Jialong Zhang and Chao Yang and Zhaoyan Xu and Guofei Gu}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {PoisonAmplifier: {A} Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {230--253}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_12}, doi = {10.1007/978-3-642-33338-5\_12}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/ZhangYXG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/YangHZSG12, author = {Chao Yang and Robert Chandler Harkreader and Jialong Zhang and Seungwon Shin and Guofei Gu}, editor = {Alain Mille and Fabien Gandon and Jacques Misselis and Michael Rabinovich and Steffen Staab}, title = {Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter}, booktitle = {Proceedings of the 21st World Wide Web Conference 2012, {WWW} 2012, Lyon, France, April 16-20, 2012}, pages = {71--80}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2187836.2187847}, doi = {10.1145/2187836.2187847}, timestamp = {Fri, 16 Apr 2021 10:04:12 +0200}, biburl = {https://dblp.org/rec/conf/www/YangHZSG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/YangHG11, author = {Chao Yang and Robert Chandler Harkreader and Guofei Gu}, editor = {Robin Sommer and Davide Balzarotti and Gregor Maier}, title = {Die Free or Live Hard? Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers}, booktitle = {Recent Advances in Intrusion Detection - 14th International Symposium, {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6961}, pages = {318--337}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23644-0\_17}, doi = {10.1007/978-3-642-23644-0\_17}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/YangHG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/SongYG10, author = {Yimin Song and Chao Yang and Guofei Gu}, title = {Who is peeping at your passwords at Starbucks? - To catch an evil twin access point}, booktitle = {Proceedings of the 2010 {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2010, Chicago, IL, USA, June 28 - July 1 2010}, pages = {323--332}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/DSN.2010.5544302}, doi = {10.1109/DSN.2010.5544302}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/SongYG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.