CHAO YANG
CHAO YANG
Verified email at cse.tamu.edu
Title
Cited by
Cited by
Year
Analyzing Spammer’s Social Networks for Fun and Profit
C Yang, R Harkreader, J Zhang, S Shin, G Gu
347*2012
Die free or live hard? empirical evaluation and new design for fighting evolving twitter spammers
C Yang, RC Harkreader, G Gu
International Workshop on Recent Advances in Intrusion Detection, 318-337, 2011
3202011
Empirical evaluation and new design for fighting evolving twitter spammers
C Yang, R Harkreader, G Gu
IEEE Transactions on Information Forensics and Security 8 (8), 1280-1293, 2013
2952013
Droidminer: Automated mining and characterization of fine-grained malicious behaviors in android applications
C Yang, Z Xu, G Gu, V Yegneswaran, P Porras
European symposium on research in computer security, 163-182, 2014
2342014
Attacks and design of image recognition CAPTCHAs
BB Zhu, J Yan, Q Li, C Yang, J Liu, N Xu, M Yi, K Cai
Proceedings of the 17th ACM conference on Computer and communications …, 2010
1812010
Cats: Characterizing automation of twitter spammers
AA Amleshwaram, N Reddy, S Yadav, G Gu, C Yang
2013 Fifth International Conference on Communication Systems and Networks …, 2013
1372013
Who is peeping at your passwords at Starbucks?—To catch an evil twin access point
Y Song, C Yang, G Gu
2010 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2010
1122010
Active user-side evil twin access point detection using statistical techniques
C Yang, Y Song, G Gu
IEEE Transactions on Information Forensics and Security 7 (5), 1638-1651, 2012
792012
Nomad: Towards non-intrusive moving-target defense against web bots
S Vikram, C Yang, G Gu
2013 IEEE Conference on Communications and Network Security (CNS), 55-63, 2013
532013
Parsing façade with rank-one approximation
C Yang, T Han, L Quan, CL Tai
2012 IEEE Conference on Computer Vision and Pattern Recognition, 1720-1727, 2012
352012
A taste of tweets: Reverse engineering twitter spammers
C Yang, J Zhang, G Gu
Proceedings of the 30th annual computer security applications conference, 86-95, 2014
302014
Using provenance patterns to vet sensitive behaviors in Android apps
C Yang, G Yang, A Gehani, V Yegneswaran, D Tariq, G Gu
International Conference on Security and Privacy in Communication Systems, 58-77, 2015
212015
PoisonAmplifier: A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks
J Zhang, C Yang, Z Xu, G Gu
21*
Detecting money-stealing apps in alternative android markets
C Yang, V Yegneswaran, P Porras, G Gu
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
202012
Understanding the market-level and network-level behaviors of the Android malware ecosystem
C Yang, J Zhang, G Gu
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
82017
Security in wireless local area networks
C Yang, G Gu
Wireless Network Security, 39-58, 2013
52013
An agent model with adaptive weight-based multi-objective algorithm for road-network congestion management
B Jiang, C Yang
International Journal of Computer and Information Technology (ISSN: 2279 …, 2014
42014
The Research of Fault-tolerant Mechanism of Grid Computing Based on Checkpoint Algorithm [J]
C YANG, W ZHANG, H ZHANG, Z TIAN, B FANG
Microelectronics & Computer 9, 2006
32006
Mining multiplex power-law distributions and retweeting patterns on twitter
B Jiang, L Wang, C Yang, R Li
2015 12th International Conference on Fuzzy Systems and Knowledge Discovery …, 2015
22015
Abusing Browser Address Bar for Fun and Profit - An Empirical Investigation of Add-On Cross Site Scripting Attacks
Y Cao, C Yang, V Rastogi, Y Chen, G Gu
International Conference on Security and Privacy in Communication Networks …, 2014
22014
The system can't perform the operation now. Try again later.
Articles 1–20