Empirical evaluation and new design for fighting evolving twitter spammers C Yang, R Harkreader, G Gu IEEE Transactions on Information Forensics and Security 8 (8), 1280-1293, 2013 | 448 | 2013 |
Analyzing Spammer’s Social Networks for Fun and Profit C Yang, R Harkreader, J Zhang, S Shin, G Gu | 430* | 2012 |
Die free or live hard? empirical evaluation and new design for fighting evolving twitter spammers C Yang, RC Harkreader, G Gu Recent Advances in Intrusion Detection: 14th International Symposium, RAID …, 2011 | 361 | 2011 |
Droidminer: Automated mining and characterization of fine-grained malicious behaviors in android applications C Yang, Z Xu, G Gu, V Yegneswaran, P Porras Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014 | 309 | 2014 |
Attacks and design of image recognition CAPTCHAs BB Zhu, J Yan, Q Li, C Yang, J Liu, N Xu, M Yi, K Cai Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 203 | 2010 |
Cats: Characterizing automation of twitter spammers AA Amleshwaram, N Reddy, S Yadav, G Gu, C Yang 2013 Fifth International Conference on Communication Systems and Networks …, 2013 | 171 | 2013 |
Who is peeping at your passwords at Starbucks?—To catch an evil twin access point Y Song, C Yang, G Gu 2010 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2010 | 135 | 2010 |
Active user-side evil twin access point detection using statistical techniques C Yang, Y Song, G Gu IEEE Transactions on Information Forensics and Security 7 (5), 1638-1651, 2012 | 101 | 2012 |
Nomad: Towards non-intrusive moving-target defense against web bots S Vikram, C Yang, G Gu 2013 IEEE Conference on Communications and Network Security (CNS), 55-63, 2013 | 65 | 2013 |
A taste of tweets: Reverse engineering twitter spammers C Yang, J Zhang, G Gu Proceedings of the 30th annual computer security applications conference, 86-95, 2014 | 39 | 2014 |
Parsing façade with rank-one approximation C Yang, T Han, L Quan, CL Tai 2012 IEEE Conference on Computer Vision and Pattern Recognition, 1720-1727, 2012 | 35 | 2012 |
Using provenance patterns to vet sensitive behaviors in Android apps C Yang, G Yang, A Gehani, V Yegneswaran, D Tariq, G Gu Security and Privacy in Communication Networks: 11th EAI International …, 2015 | 30 | 2015 |
PoisonAmplifier: A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks J Zhang, C Yang, Z Xu, G Gu | 26* | |
Detecting money-stealing apps in alternative android markets C Yang, V Yegneswaran, P Porras, G Gu Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 22 | 2012 |
Understanding the market-level and network-level behaviors of the Android malware ecosystem C Yang, J Zhang, G Gu 2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017 | 10 | 2017 |
Security in wireless local area networks L Chen, J Ji, Z Zhang, C Yang, G Gu Wireless Network Security: Theories and Applications, 39-58, 2013 | 10 | 2013 |
Abusing Browser Address Bar for Fun and Profit - An Empirical Investigation of Add-On Cross Site Scripting Attacks Y Cao, C Yang, V Rastogi, Y Chen, G Gu International Conference on Security and Privacy in Communication Networks …, 2015 | 6 | 2015 |
Mining multiplex power-law distributions and retweeting patterns on twitter 1 B Jiang, C Yang, L Wang, R Li Journal of Intelligent & Fuzzy Systems 31 (2), 1009-1016, 2016 | 5 | 2016 |
An agent model with adaptive weight-based multi-objective algorithm for road-network congestion management 寺野隆雄 International Journal of Computer and Information Technology 3, 1188-1198, 2014 | 4 | 2014 |
A Brownian Agent Model for Analyzing Changes in a Nation's Product Space Structure B Jiang, C Yang, T Yamada, T Terano International Journal of Intelligent Information Technologies (IJIIT) 11 (1 …, 2015 | 2 | 2015 |