Deepxplore: Automated whitebox testing of deep learning systems K Pei, Y Cao, J Yang, S Jana proceedings of the 26th Symposium on Operating Systems Principles, 1-18, 2017 | 1523 | 2017 |
Towards making systems forget with machine unlearning Y Cao, J Yang 2015 IEEE symposium on security and privacy, 463-480, 2015 | 504 | 2015 |
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework. Y Cao, Y Fratantonio, A Bianchi, M Egele, C Kruegel, G Vigna, Y Chen NDSS, 2015 | 239 | 2015 |
Enhancing state-of-the-art classifiers with api semantics to detect evolved android malware X Zhang, Y Zhang, M Zhong, D Ding, Y Cao, Y Zhang, M Zhang, M Yang Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020 | 155 | 2020 |
(Cross-)Browser Fingerprinting via OS and Hardware Level Features Y Cao, S Li, E Wijmans Proceedings of Network & Distributed System Security Symposium (NDSS), 2017 | 152 | 2017 |
Towards practical verification of machine learning: The case of computer vision systems. K Pei, Y Cao, J Yang, S Jana arXiv preprint arXiv:1712.01785, 2017 | 133 | 2017 |
Practical blind membership inference attack via differential comparisons B Hui, Y Yang, H Yuan, P Burlina, NZ Gong, Y Cao Network and Distributed System Security Symposium (NDSS 2021), 2021 | 116 | 2021 |
Patchattack: A black-box texture-based attack with reinforcement learning C Yang, A Kortylewski, C Xie, Y Cao, A Yuille European Conference on Computer Vision, 681-698, 2020 | 94 | 2020 |
Vetting SSL usage in applications with SSLINT B He, V Rastogi, Y Cao, Y Chen, VN Venkatakrishnan, R Yang, Z Zhang 2015 IEEE Symposium on Security and Privacy, 519-534, 2015 | 80 | 2015 |
Trustllm: Trustworthiness in large language models L Sun, Y Huang, H Wang, S Wu, Q Zhang, C Gao, Y Huang, W Lyu, ... arXiv preprint arXiv:2401.05561, 2024 | 79 | 2024 |
PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks. Y Cao, V Yegneswaran, PA Porras, Y Chen NDSS, 2012 | 72 | 2012 |
De-obfuscation and detection of malicious PDF files with high accuracy X Lu, J Zhuge, R Wang, Y Cao, Y Chen 2013 46th Hawaii International Conference on System Sciences, 4890-4899, 2013 | 66 | 2013 |
Cspautogen: Black-box enforcement of content security policy upon real-world websites X Pan, Y Cao, S Liu, Y Zhou, Y Chen, T Zhou Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 59 | 2016 |
An ever-evolving game: Evaluation of real-world attacks and defenses in ethereum ecosystem S Zhou, Z Yang, J Xiang, Y Cao, M Yang, Y Zhang 29th {USENIX} Security Symposium ({USENIX} Security 20), 2793-2810, 2020 | 57 | 2020 |
FlowCog: Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps X Pan, Y Cao, X Du, B He, G Fang, R Shao, Y Chen 27th USENIX Security Symposium (USENIX Security 18), 1669-1685, 2018 | 53* | 2018 |
I do not know what you visited last summer: Protecting users from third-party web tracking with trackingfree browser X Pan, Y Cao, Y Chen Proceedings of the 2015 Annual Network and Distributed System Security …, 2015 | 51 | 2015 |
Detecting node.js prototype pollution vulnerabilities via object lookup analysis S Li, M Kang, J Hou, Y Cao Proceedings of the 29th ACM Joint Meeting on European Software Engineering …, 2021 | 48 | 2021 |
Efficient repair of polluted machine learning systems via causal unlearning Y Cao, AF Yu, A Aday, E Stahl, J Merwine, J Yang Proceedings of the 2018 on Asia conference on computer and communications …, 2018 | 47 | 2018 |
Deterministic browser Y Cao, Z Chen, S Li, S Wu Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 42 | 2017 |
Uranine: Real-time privacy leakage monitoring without system modification for android V Rastogi, Z Qu, J McClurg, Y Cao, Y Chen Security and Privacy in Communication Networks: 11th EAI International …, 2015 | 41 | 2015 |