Folgen
Chuan Yue
Chuan Yue
Associate Professor of Computer Science, Colorado School of Mines
Bestätigte E-Mail-Adresse bei mines.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Characterizing insecure JavaScript practices on the web
C Yue, H Wang
Proceedings of the 18th international conference on World wide web, 961-970, 2009
1652009
BogusBiter: A transparent protection against phishing attacks
C Yue, H Wang
ACM Transactions on Internet Technology (TOIT) 10 (2), 1-31, 2010
1342010
Real-time collaborative browsing
C Yue, H Wang
US Patent App. 12/567,295, 2010
1112010
Phishing suspiciousness in older and younger adults: The role of executive functioning
BE Gavett, R Zhao, SE John, CA Bussell, JR Roberts, C Yue
PloS one 12 (2), e0171620, 2017
762017
Anti-phishing in offense and defense
C Yue, H Wang
2008 Annual Computer Security Applications Conference (ACSAC), 345-354, 2008
702008
All Your Browser-saved Passwords Could Belong to Us: a Security Analysis and a Cloud-based New Design
R Zhao, C Yue
ACM Conference on Data and Applications Security (CODASPY), 2013
512013
Attention please: Your attention check questions in survey studies can be automatically answered
W Pei, A Mayer, K Tu, C Yue
Proceedings of The Web Conference 2020, 1182-1193, 2020
482020
An automatic HTTP cookie management system
C Yue, M Xie, H Wang
Computer Networks 54 (13), 2182-2198, 2010
462010
A comparative measurement study of web tracking on mobile and desktop environments
Z Yang, C Yue
Proceedings on Privacy Enhancing Technologies 2020 (2), 2020
422020
Mining least privilege attribute based access control policies
MW Sanders, C Yue
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
422019
Toward a secure and usable cloud-based password manager for web browsers
R Zhao, C Yue
Computers & Security 46, 32-47, 2014
402014
A measurement study of insecure javascript practices on the web
C Yue, H Wang
ACM Transactions on the Web (TWEB) 7 (2), 1-39, 2013
372013
Automatic cookie usage setting with cookiepicker
C Yue, M Xie, H Wang
37th Annual IEEE/IFIP International Conference on Dependable Systems and …, 2007
322007
Attacking and protecting tunneled traffic of smart home devices
A Alshehri, J Granley, C Yue
Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020
312020
Visualizing and interpreting rnn models in url-based phishing detection
T Feng, C Yue
Proceedings of the 25th ACM Symposium on Access Control Models and …, 2020
292020
Client side username/password credential protection
C Yue, H Wang
US Patent 8,307,433, 2012
292012
Design and evaluation of the highly insidious extreme phishing attacks
R Zhao, S John, S Karas, C Bussell, J Roberts, D Six, B Gavett, C Yue
Computers & Security 70, 634-647, 2017
282017
SessionMagnifier: A simple approach to secure and convenient kiosk browsing
C Yue, H Wang
Proceedings of the 11th international conference on Ubiquitous computing …, 2009
262009
The Devil is Phishing: Rethinking Web Single Sign-On Systems Security
C Yue
USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 1-4, 2013
252013
Website fingerprinting by power estimation based side-channel attacks on Android 7
Y Qin, C Yue
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
232018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20