Phishing suspiciousness in older and younger adults: The role of executive functioning BE Gavett, R Zhao, SE John, CA Bussell, JR Roberts, C Yue PloS one 12 (2), e0171620, 2017 | 96 | 2017 |
All your browser-saved passwords could belong to us: a security analysis and a cloud-based new design R Zhao, C Yue Proceedings of the third ACM conference on Data and application security and …, 2013 | 55 | 2013 |
Toward a secure and usable cloud-based password manager for web browsers R Zhao, C Yue Computers & Security 46, 32-47, 2014 | 42 | 2014 |
Design and evaluation of the highly insidious extreme phishing attacks R Zhao, S John, S Karas, C Bussell, J Roberts, D Six, B Gavett, C Yue Computers & Security 70, 634-647, 2017 | 29 | 2017 |
Vulnerability and risk analysis of two commercial browser and cloud based password managers R Zhao, C Yue, K Sun ASE Science Journal 1 (4), 1-15, 2013 | 28 | 2013 |
Automatic Detection of Information Leakage Vulnerabilities in Browser Extensions R Zhao, C Yue, Q Yi Proceedings of the 24th International Conference on World Wide Web, 1384-1394, 2015 | 23 | 2015 |
SafeSky: a secure cloud storage middleware for end-user applications R Zhao, C Yue, B Tak, C Tang 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS), 21-30, 2015 | 19 | 2015 |
CryptoTutor: Teaching Secure Coding Practices through Misuse Pattern Detection L Singleton, R Zhao, M Song, H Siy Proceedings of the 21st Annual Conference on Information Technology …, 2020 | 18 | 2020 |
The highly insidious extreme phishing attacks R Zhao, S John, S Karas, C Bussell, J Roberts, D Six, B Gavett, C Yue 2016 25th International Conference on Computer Communication and Networks …, 2016 | 16 | 2016 |
A security analysis of two commercial browser and cloud based password managers R Zhao, C Yue, K Sun 2013 International Conference on Social Computing, 448-453, 2013 | 13 | 2013 |
A machine-learning based framework for detection of fake political speech C Purevdagva, R Zhao, PC Huang, W Mahoney 2020 IEEE 14th International Conference on Big Data Science and Engineering …, 2020 | 11 | 2020 |
FireBugs: finding and repairing bugs with security patterns L Singleton, R Zhao, M Song, H Siy 2019 IEEE/ACM 6th International Conference on Mobile Software Engineering …, 2019 | 11 | 2019 |
Effective Mobile Web User Fingerprinting via Motion Sensors Z Yang, R Zhao, C Yue 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 8 | 2018 |
Sensor-Based Mobile Web Cross-Site Input Inference Attacks and Defenses R Zhao, C Yue, Q Han IEEE Transactions on Information Forensics and Security 14 (1), 75-89, 2019 | 6 | 2019 |
Cross-site input inference attacks on mobile web users R Zhao, C Yue, Q Han Security and Privacy in Communication Networks: 13th International …, 2018 | 6 | 2018 |
FireBugs: Finding and Repairing Cryptography API Misuses in Mobile Applications L Singleton, R Zhao, H Siy, M Song 2021 IEEE 45th Annual Computers, Software, and Applications Conference …, 2021 | 5 | 2021 |
The Chameleon on the Web: an Empirical Study of the Insidious Proactive Web Defacements R Zhao Proceedings of the ACM Web Conference 2023, 2241-2251, 2023 | 4 | 2023 |
SSDTutor: A feedback-driven intelligent tutoring system for secure software development DKP Newar, R Zhao, H Siy, LK Soh, M Song Science of Computer Programming 227, 102933, 2023 | 4 | 2023 |
FProbe: the Flow-centric Detection and a Large-scale Measurement of Browser Fingerprinting R Zhao IEEE International Conference on Computer Communication and Networks, 2023 | 1 | 2023 |
An Intelligent Tutoring System for API Misuse Correction by Instant Quality Feedback R Zhao, H Siy, C Pack, LK Soh, M Song 2022 IEEE 46th Annual Computers, Software, and Applications Conference …, 2022 | 1 | 2022 |